SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(Oracle Issues Fix) Kerberos KDC Database Propagation Daemon Input Validation Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1025180
SecurityTracker URL:  http://securitytracker.com/id/1025180
CVE Reference:   CVE-2010-4022   (Links to External Site)
Date:  Mar 9 2011
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the Kerberos KDC Database Propagation Daemon. A remote user can cause denial of service conditions.

A remote user can send specially crafted data to the target MIT krb5 KDC database propagation daemon (kpropd) to cause the daemon to terminate its listening process. This will prevent database propagations to the KDC host on which the daemon was running.

Configurations where kpropd is running in standalone mode (the "-S" option) is affected.

Configurations where kpropd runs in incremental propagation mode ("iprop") or as an inetd server are not affected.

Keiichi Mori of Red Hat reported this vulnerability.

Impact:   A remote user can cause denial of service conditions.
Solution:   Oracle has issued a fix.

The Oracle advisory is available at:

http://blogs.sun.com/security/entry/cve_2010_4022_improper_input

Vendor URL:  web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-001.txt (Links to External Site)
Cause:   Input validation error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  10, 11

Message History:   This archive entry is a follow-up to the message listed below.
Feb 8 2011 Kerberos KDC Database Propagation Daemon Input Validation Flaw Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC