First published: Fri Apr 19 2013(Updated: )
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application | <1.10.5 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
openSUSE | =12.3 | |
Fedora | =17 | |
Fedora | =18 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
redhat enterprise Linux eus | =6.4 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.4 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1416 is considered a denial of service vulnerability due to a null pointer dereference that can lead to a daemon crash.
To fix CVE-2013-1416, upgrade to MIT Kerberos 5 version 1.10.5 or later.
CVE-2013-1416 affects multiple versions of MIT Kerberos 5 and several versions of openSUSE and Fedora.
Yes, CVE-2013-1416 can be exploited by remote authenticated users to cause a denial of service.
CVE-2013-1416 allows attackers to cause a denial of service by crashing the Key Distribution Center (KDC) daemon.