First published: Fri Jun 09 2000(Updated: )
Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cygnus Network Security | =4.0 | |
Kerbnet | =5.0 | |
Kerberos | =4.0 | |
Kerberos | =1.0 | |
Kerberos | =1.1 | |
Kerberos | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0549 is classified as a denial of service vulnerability that can disrupt the availability of the Kerberos 4 KDC program.
To fix CVE-2000-0549, ensure that you apply the latest patches provided by your software vendor for affected versions of Kerberos.
CVE-2000-0549 affects versions 4.0 and 5.0 of Cygnus Network Security and MIT Kerberos 5 versions 1.0, 1.1, and 1.1.1.
Yes, CVE-2000-0549 can be exploited remotely by attackers sending malformed AUTH_MSG_KDC_REQUEST requests.
CVE-2000-0549 facilitates denial of service attacks that can cause the Kerberos KDC to crash or become unresponsive.