VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-100104-001
Kerberos KDC Cross Realm Referral Denial of Service Vulnerability
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2009-003.txt

A null pointer dereference can occur in an error condition in the KDC cross-realm referral processing code in MIT krb5-1.7. This can cause the KDC to crash.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2010-01-04
Source Information Category:
Advisory, Alert
Last Updated:
2010-01-04




Affected Product Tags
cpe:/a:mit:kerberos     (MIT Kerberos)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

X Low-Medium [?]
Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

Simple [?]
X None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
None [?]

X Exploit or PoC [?]
Activity Observed [?]

Alternatives




References
Common Vulnerabilities and Exposures (CVE) CVE-2009-3295
The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realmreferral implementation in the Key Distribution Center (KDC) in MITKerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers tocause a denial of service (NULL pointer dereference and daemon crash)via a ticket request.





Copyright © 2010 JPCERT/CC All Rights Reserved.