First published: Thu Feb 10 2011(Updated: )
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application | =5-1.6.3 | |
MIT Kerberos 5 Application | =1.6 | |
MIT Kerberos 5 Application | =1.6.1 | |
MIT Kerberos 5 Application | =1.6.2 | |
MIT Kerberos 5 Application | =1.7 | |
MIT Kerberos 5 Application | =1.7.1 | |
MIT Kerberos 5 Application | =1.8 | |
MIT Kerberos 5 Application | =1.8.1 | |
MIT Kerberos 5 Application | =1.8.2 | |
MIT Kerberos 5 Application | =1.8.3 | |
MIT Kerberos 5 Application | =1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0282 has a severity rating that indicates it could lead to denial of service due to a NULL pointer dereference or buffer over-read.
To fix CVE-2011-0282, upgrade to a patched version of MIT Kerberos 5 that addresses this vulnerability.
CVE-2011-0282 affects MIT Kerberos 5 versions 1.6.x up to 1.9 when using an LDAP backend.
Yes, CVE-2011-0282 can be exploited by remote attackers to cause a daemon crash.
CVE-2011-0282 is a denial of service vulnerability resulting from improper handling of crafted principal names.