First published: Tue Mar 17 2009(Updated: )
A null pointer dereference flaw was found in Kerberos's GSS-API spnego security mechanism implemenation. A local user could use this flaw to cause a denial of service (krb5 daemon crash) via invalid ContextFlags for the reqFlags field in the NegTokenInit (RFC 4178). References: <a href="http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=6402">http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=6402</a> Upstream patch: <a href="http://src.mit.edu/fisheye/changelog/krb5/?cs=22099">http://src.mit.edu/fisheye/changelog/krb5/?cs=22099</a>
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-490634 is classified as a denial of service vulnerability that could crash the krb5 daemon.
To fix REDHAT-BUG-490634, update the MIT Kerberos software to the latest patched version available.
Local users of MIT Kerberos are affected by REDHAT-BUG-490634 due to the flaw in the GSS-API spnego implementation.
REDHAT-BUG-490634 exploits a null pointer dereference flaw via invalid ContextFlags for the reqFlags field.
If REDHAT-BUG-490634 is exploited, it could lead to a denial of service by crashing the krb5 daemon.