First published: Tue Jul 22 2014(Updated: )
A double-free flaw was found in the MIT Kerberos SPNEGO initiators. An attacker able to spoof packets to appear as though they are from an GSSAPI acceptor could use this flaw to crash a client application that uses MIT Kerberos. It is reported that this issue affects version 1.10 and later. Upstream commit and further details: <a href="https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f">https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Kerberos | >=1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1121876 is considered significant due to the potential for application crashes.
To fix REDHAT-BUG-1121876, you should update MIT Kerberos to a version later than 1.10.
REDHAT-BUG-1121876 affects MIT Kerberos version 1.10 and later.
The vulnerability in REDHAT-BUG-1121876 is a double-free flaw that could be exploited to crash client applications.
Yes, an attacker can exploit REDHAT-BUG-1121876 via packet spoofing to crash a client application.