First published: Thu Oct 20 2011(Updated: )
The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | =1.8 | |
MIT Kerberos 5 | =1.8.1 | |
MIT Kerberos 5 | =1.8.2 | |
MIT Kerberos 5 | =1.8.3 | |
MIT Kerberos 5 | =1.8.4 | |
MIT Kerberos 5 | =1.9 | |
MIT Kerberos 5 | =1.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1529 is classified as a medium severity vulnerability due to its potential for causing denial of service.
To fix CVE-2011-1529, upgrade to MIT Kerberos 5 versions 1.8.5 or 1.9.2 or later.
CVE-2011-1529 affects MIT Kerberos 5 versions 1.8 through 1.8.4 and 1.9 through 1.9.1.
CVE-2011-1529 allows remote attackers to exploit a NULL pointer dereference leading to a daemon crash.
The lookup_lockout_policy function in the Key Distribution Center (KDC) is impacted by CVE-2011-1529.