---------------------------------------------------------------------- Looking for a job? Secunia is hiring skilled researchers and talented developers. http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Kerberos GSS-API NULL Pointer Dereference Vulnerability SECUNIA ADVISORY ID: SA39762 VERIFY ADVISORY: http://secunia.com/advisories/39762/ DESCRIPTION: A vulnerability has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to a NULL pointer dereference error when processing certain Kerberos AP-REQ authenticators, which can be exploited to cause a crash in e.g. kadmind or other applications linked against the GSS-API library by sending an AP-REQ authenticator with a missing checksum field. The vulnerability is reported in all releases including krb5-1.8.1. SOLUTION: Apply patches. Reportedly, the vulnerability will be fixed in the upcoming krb5-1.8.2 release and an upcoming krb5-1.7 series release. Patch for krb5-1.6: http://web.mit.edu/kerberos/advisories/2010-005-patch_r16.txt.asc Patch for krb5-1.7 and krb5-1.8.1: http://web.mit.edu/kerberos/advisories/2010-005-patch.txt.asc PROVIDED AND/OR DISCOVERED BY: The vendor credits Shawn Emery, Oracle. ORIGINAL ADVISORY: MITKRB5-SA-2010-005: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------