APP: MIT Kerberos KDC Cross Realm Referral Denial of Service

A denial of service vulnerability exists in MIT's Kerberos. The vulnerability is due to a NULL pointer dereference in the KDC cross-realm referral processing implementation. A remote attacker can exploit this vulnerability by sending a crafted packet to an affected KDC, causing it to crash, creating a denial of service condition.

Extended Description

MIT Kerberos is prone to a remote denial-of-service vulnerability caused by a NULL-pointer dereference. An attacker may exploit this issue to crash the KDC service, resulting in denial-of-service conditions. Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed. UPDATE (January 5, 2010): To exploit this vulnerability, attackers must authenticate. MIT Kerberos 5 1.7 is vulnerable.

Affected Products

Suse suse_linux_enterprise_sdk

References

BugTraq: 37486

CVE: CVE-2009-3295

Short Name
APP:KERBEROS:XREALM-DOS
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2009-3295 Cross Denial KDC Kerberos MIT Realm Referral Service bid:37486 of
Release Date
10/19/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
Port
udp/88
False Positive
Unknown
Vendors

Red_hat

Suse

Mit

Gentoo

Ubuntu

CVSS Score

5.0

Found a potential security threat?