schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) prior to 1.11.3 does not properly validate UDP packets before sending responses, which allows remote malicious users to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mit kerberos 5 |
||
opensuse opensuse 11.4 |
||
opensuse opensuse 12.2 |
||
opensuse opensuse 12.3 |
||
fedoraproject fedora 17 |
||
fedoraproject fedora 18 |
||
fedoraproject fedora 19 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux eus 5.9 |
||
redhat enterprise linux eus 6.4 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux server aus 6.4 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux workstation 6.0 |
||
debian debian linux 6.0 |
||
debian debian linux 7.0 |
||
debian debian linux 8.0 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 15.04 |
||
canonical ubuntu linux 15.10 |