Short Name |
APP:KERBEROS:MULTI-REALM-DOS |
---|---|
Severity |
High |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Kerberos Multi-realm KDC NULL Pointer Dereference Denial of Service |
Release Date |
2014/02/24 |
Update Number |
2348 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Kerberos protocol. The vulnerability is due to a NULL pointer dereference within the setup_server_realm() function when Kerberos is configured to serve multiple realms. A remote attacker can exploit this vulnerability by sending a malicious request to a vulnerable installation of Kerberos. Successful exploitation will cause the krb5kdc daemon to terminate resulting in a denial of service condition.
The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.