Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:KERBEROS:XREALM-KDC-DOS

Severity

High

Recommended

Yes

Recommended Action

Drop

Category

APP

Keywords

MIT Kerberos Cross-Realm Referrals KDC Denial of Service

Release Date

2014/02/18

Update Number

2346

Supported Platforms

idp-4.1+, isg-3.5+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: MIT Kerberos Cross-Realm Referrals KDC Denial of Service


This signature detects attempts to exploit a known vulnerability against MIT Kerberos. The vulnerability is due to a NULL pointer dereference within the process_tgs_req function. A successful attack can allow a remote authenticated attacker to trigger a denial of service condition on the targeted application.

Extended Description

do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.

Affected Products

  • mit kerberos 5-1.11
  • mit kerberos 5-1.11.1
  • mit kerberos 5-1.11.2
  • mit kerberos 5-1.11.3

References

  • CVE: CVE-2013-1417

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out