English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Kerberos GSS-API NULL Pointer Dereference Vulnerability


Secunia ID

SA39762

CVE-ID

CVE-2010-1321

Release Date

19 May 2010

Criticality

Less Critical

Solution Status

Vendor Patch

Software

Kerberos 5.x

Where

From remote

Impact
DoS (Denial of Service)

This includes vulnerabilities ranging from excessive resource consumption (e.g. causing a system to use a lot of memory) to crashing an application or an entire system.

Description

A vulnerability has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).

The vulnerability is caused due to a NULL pointer dereference error when processing certain Kerberos AP-REQ authenticators, which can be exploited to cause a crash in e.g. kadmind or other applications linked against the GSS-API library by sending an AP-REQ authenticator with a missing checksum field.

The vulnerability is reported in all releases including krb5-1.8.1.

Solution

Apply patches. Reportedly, the vulnerability will be fixed in the upcoming krb5-1.8.2 release and an upcoming krb5-1.7 series release.

Patch for krb5-1.6:
http://web.mit.edu/kerberos/advisories/2010-005-patch_r16.txt.asc

Patch for krb5-1.7 and krb5-1.8.1:
http://web.mit.edu/kerberos/advisories/2010-005-patch.txt.asc

Reported by

The vendor credits Shawn Emery, Oracle.

Original Advisory

MITKRB5-SA-2010-005:
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt