SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(Ubuntu Issues Fix) Kerberos kpasswd UDP Processing Lets Remote Users Deny Service
SecurityTracker Alert ID:  1034143
SecurityTracker URL:  http://securitytracker.com/id/1034143
CVE Reference:   CVE-2002-2443   (Links to External Site)
Date:  Nov 13 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   A vulnerability was reported in MIT Kerberos. A remote user can cause denial of service conditions.

A remote user can send spoofed UDP packets to a target kadmind server running kpasswd to cause kpasswd to pass the UDP packets to the spoofed address and reply to the packets, consume excessive CPU resources and bandwidth.

This type of exploit is known as a UDP ping-pong attack.

Impact:   A remote user can consume excessive CPU resources on the target system and bandwidth on the target network.
Solution:   Ubuntu has issued a fix.

The Ubuntu advisory is available at:

http://www.ubuntu.com/usn/usn-2810-1

Vendor URL:  www.ubuntu.com/usn/usn-2810-1 (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  12.04 LTS, 14.04 LTS, 15.04, 15.10

Message History:   This archive entry is a follow-up to the message listed below.
May 15 2013 Kerberos kpasswd UDP Processing Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC