CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
AI Score
Confidence
Low
EPSS
Percentile
99.4%
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
Vendor | Product | Version | CPE |
---|---|---|---|
mit | kerberos_5 | * | cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:* |
opensuse | opensuse | 11.4 | cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* |
opensuse | opensuse | 12.1 | cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:* |
opensuse | opensuse | 12.2 | cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* |
opensuse | opensuse | 12.3 | cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* |
fedoraproject | fedora | 17 | cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* |
fedoraproject | fedora | 18 | cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 6.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 6.4 | cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 6.0 | cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* |
krbdev.mit.edu/rt/Ticket/Display.html?id=7600
lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html
lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html
lists.opensuse.org/opensuse-updates/2013-05/msg00011.html
lists.opensuse.org/opensuse-updates/2013-06/msg00041.html
lists.opensuse.org/opensuse-updates/2013-06/msg00102.html
rhn.redhat.com/errata/RHSA-2013-0748.html
www.mandriva.com/security/advisories?name=MDVSA-2013:157
www.mandriva.com/security/advisories?name=MDVSA-2013:158
github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81