APP: MIT Kerberos KDC Cross Realm Referral Denial of Service
A denial of service vulnerability exists in MIT's Kerberos. The vulnerability is due to a NULL pointer dereference in the KDC cross-realm referral processing implementation. A remote attacker can exploit this vulnerability by sending a crafted packet to an affected KDC, causing it to crash, creating a denial of service condition.
Extended Description
MIT Kerberos is prone to a remote denial-of-service vulnerability caused by a NULL-pointer dereference. An attacker may exploit this issue to crash the KDC service, resulting in denial-of-service conditions. Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed. UPDATE (January 5, 2010): To exploit this vulnerability, attackers must authenticate. MIT Kerberos 5 1.7 is vulnerable.
Affected Products
Suse suse_linux_enterprise_sdk
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Mit
Gentoo
Ubuntu
5.0