First published: Tue Mar 05 2013(Updated: )
The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application | <1.10.4 | |
MIT Kerberos 5 Application | =1.11 | |
openSUSE | =11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1415 is classified as a moderate severity vulnerability.
To fix CVE-2013-1415, upgrade MIT Kerberos 5 to version 1.10.4 or later, or 1.11.1 or later.
CVE-2013-1415 affects MIT Kerberos 5 versions prior to 1.10.4 and various 1.11.x versions before 1.11.1.
The vulnerability in CVE-2013-1415 is related to improper error handling during the extraction of fields from X.509 certificates.
There are no known workarounds for CVE-2013-1415; updating to a secure version is recommended.