First published: Thu Dec 08 2011(Updated: )
The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos | =5.1.9 | |
MIT Kerberos | =5.1.9.1 | |
MIT Kerberos | =5.1.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1530 has a severity classification that indicates it can lead to a denial of service due to a NULL pointer dereference.
To fix CVE-2011-1530, upgrade to a patched version of MIT Kerberos 5 that addresses this vulnerability.
CVE-2011-1530 affects remote authenticated users exploiting certain versions of MIT Kerberos 5, specifically 1.9 to 1.9.2.
CVE-2011-1530 enables a denial of service attack that can crash the Key Distribution Center.
MIT Kerberos 5 versions 1.9, 1.9.1, and 1.9.2 are vulnerable to CVE-2011-1530.