Secunia Security Advisory - A vulnerability has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).
ad9f741a8a222dba190b96d36f16c903035d619ed9767c04a2ad60e6af5b6144
----------------------------------------------------------------------
Looking for a job?
Secunia is hiring skilled researchers and talented developers.
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Kerberos GSS-API NULL Pointer Dereference Vulnerability
SECUNIA ADVISORY ID:
SA39762
VERIFY ADVISORY:
http://secunia.com/advisories/39762/
DESCRIPTION:
A vulnerability has been reported in Kerberos, which can be exploited
by malicious users to cause a DoS (Denial of Service).
The vulnerability is caused due to a NULL pointer dereference error
when processing certain Kerberos AP-REQ authenticators, which can be
exploited to cause a crash in e.g. kadmind or other applications
linked against the GSS-API library by sending an AP-REQ authenticator
with a missing checksum field.
The vulnerability is reported in all releases including krb5-1.8.1.
SOLUTION:
Apply patches. Reportedly, the vulnerability will be fixed in the
upcoming krb5-1.8.2 release and an upcoming krb5-1.7 series release.
Patch for krb5-1.6:
http://web.mit.edu/kerberos/advisories/2010-005-patch_r16.txt.asc
Patch for krb5-1.7 and krb5-1.8.1:
http://web.mit.edu/kerberos/advisories/2010-005-patch.txt.asc
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Shawn Emery, Oracle.
ORIGINAL ADVISORY:
MITKRB5-SA-2010-005:
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------