Computer Security
[EN] securityvulns.ru no-pyccku


MIT Kerberos 5 security vulnerabilities
Published:11.02.2011
Source:
SecurityVulns ID:11423
Type:remote
Threat Level:
5/10
Description:kpropd and KDC DoS.
Affected:MIT : krb5 1.9
CVE:CVE-2011-0281 (The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.)
 CVE-2010-4022 (The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.)
Original documentdocumentMIT, MITKRB5-SA-2011-001 kpropd denial of service [CVE-2010-4022] (11.02.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod