SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(Heimdal Issues Fix) Kerberos GSS-API Library Null Pointer Dereference Lets Remote Authenticated Users Deny Service
SecurityTracker Alert ID:  1024045
SecurityTracker URL:  http://securitytracker.com/id/1024045
CVE Reference:   CVE-2010-1321   (Links to External Site)
Date:  May 28 2010
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Kerberos. A remote authenticated user can cause denial of service conditions.

A remote authenticated user can send a specially crafted GSS-API token with a missing checksum field to trigger a null pointer dereference in krb5_gss_accept_sec_context() and cause the target GSS-API service to crash. The kadmind server is affected.

Shawn Emery (Oracle) reported this vulnerability.

Impact:   A remote authenticated user can cause the target GSS-API service to crash.
Solution:   Heimdal has issued a fix (1.3.3).

The Heimdal advisory is available at:

http://www.h5l.org/advisories.html?show=2010-05-27

Vendor URL:  web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry is a follow-up to the message listed below.
May 18 2010 Kerberos GSS-API Library Null Pointer Dereference Lets Remote Authenticated Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC