SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(Oracle Issues Fix for Solaris) Kerberos kpasswd UDP Processing Lets Remote Users Deny Service
SecurityTracker Alert ID:  1029097
SecurityTracker URL:  http://securitytracker.com/id/1029097
CVE Reference:   CVE-2002-2443   (Links to External Site)
Date:  Sep 26 2013
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in MIT Kerberos. A remote user can cause denial of service conditions.

A remote user can send spoofed UDP packets to a target kadmind server running kpasswd to cause kpasswd to pass the UDP packets to the spoofed address and reply to the packets, consume excessive CPU resources and bandwidth.

This type of exploit is known as a UDP ping-pong attack.

Impact:   A remote user can consume excessive CPU resources on the target system and bandwidth on the target network.
Solution:   Oracle has issued a fix for Solaris.

The Oracle advisory is available at:

https://blogs.oracle.com/sunsecurity/entry/cve_2002_2443_denial_of

Vendor URL:  web.mit.edu/kerberos/ (Links to External Site)
Cause:   State error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  10, 11.1

Message History:   This archive entry is a follow-up to the message listed below.
May 15 2013 Kerberos kpasswd UDP Processing Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC