VULNERABILITIES / FIXES - June 05, 2012
by Carol~ - 6/5/12 9:44 AM
Kerberos "check_1_6_dummy()" Denial of Service Weakness
Release Date : 2012-06-05
Criticality level : Not critical
Impact : DoS
Where : From local network
Solution Status : Vendor Patch
Software: Kerberos 5.x
A weakness has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).
The vulnerability is caused due to a NULL pointer dereference error in the "check_1_6_dummy()" function in src/lib/kadm5/srv/svr_principal.c. This can be exploited to cause a crash via a create-principal request containing no password but the KRB5_KDB_DISALLOW_ALL_TIX flag.
Successful exploitation requires an administrator account with "create" privileges.
The weakness is reported in versions prior to 1.10.2.
Update to version 1.10.2.
Provided and/or discovered by:
Reported by the vendor.