SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
Kerberos kpasswd UDP Processing Lets Remote Users Deny Service
SecurityTracker Alert ID:  1028569
SecurityTracker URL:  http://securitytracker.com/id/1028569
CVE Reference:   CVE-2002-2443   (Links to External Site)
Date:  May 15 2013
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in MIT Kerberos. A remote user can cause denial of service conditions.

A remote user can send spoofed UDP packets to a target kadmind server running kpasswd to cause kpasswd to pass the UDP packets to the spoofed address and reply to the packets, consume excessive CPU resources and bandwidth.

This type of exploit is known as a UDP ping-pong attack.

Impact:   A remote user can consume excessive CPU resources on the target system and bandwidth on the target network.
Solution:   The vendor plans to issue a fix in future version krb5-1.11.3.

The vendor has issued a source code fix, available at:

https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c

Vendor URL:  web.mit.edu/kerberos/ (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 12 2013 (Red Hat Issues Fix) Kerberos kpasswd UDP Processing Lets Remote Users Deny Service
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.
Sep 26 2013 (Oracle Issues Fix for Solaris) Kerberos kpasswd UDP Processing Lets Remote Users Deny Service
Oracle has issued a fix for Solaris 10 and 11.1.
Nov 13 2015 (Ubuntu Issues Fix) Kerberos kpasswd UDP Processing Lets Remote Users Deny Service
Ubuntu has issued a fix for Ubuntu Linux 12.04 LTS, 14.04 LTS, 15.04, and 15.10.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC