APP: MIT Kerberos Cross-Realm Referrals KDC Denial of Service

This signature detects attempts to exploit a known vulnerability against MIT Kerberos. The vulnerability is due to a NULL pointer dereference within the process_tgs_req function. A successful attack can allow a remote authenticated attacker to trigger a denial of service condition on the targeted application.

Extended Description

do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.

Affected Products

Mit kerberos_5

References

CVE: CVE-2013-1417

Short Name
APP:KERBEROS:XREALM-KDC-DOS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2013-1417 Cross-Realm Denial KDC Kerberos MIT Referrals Service of
Release Date
02/18/2014
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Mit

CVSS Score

3.5

Found a potential security threat?