5
CVSSv2

CVE-2002-2443

Published: 29/05/2013 Updated: 02/02/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) prior to 1.11.3 does not properly validate UDP packets before sending responses, which allows remote malicious users to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5

opensuse opensuse 11.4

opensuse opensuse 12.2

opensuse opensuse 12.3

fedoraproject fedora 17

fedoraproject fedora 18

fedoraproject fedora 19

redhat enterprise linux desktop 5.0

redhat enterprise linux desktop 6.0

redhat enterprise linux eus 5.9

redhat enterprise linux eus 6.4

redhat enterprise linux server 5.0

redhat enterprise linux server 6.0

redhat enterprise linux server aus 6.4

redhat enterprise linux workstation 5.0

redhat enterprise linux workstation 6.0

debian debian linux 6.0

debian debian linux 7.0

debian debian linux 8.0

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

canonical ubuntu linux 15.10

Vendor Advisories

Debian Bug report logs - #708267 cve-2002-2443: kpasswd udp ping-pong Package: krb5-admin-server; Maintainer for krb5-admin-server is Sam Hartman <hartmans@debianorg>; Source for krb5-admin-server is src:krb5 (PTS, buildd, popcon) Reported by: Benjamin Kaduk <kaduk@MITEDU> Date: Tue, 14 May 2013 16:39:01 UTC Owned ...
Several security issues were fixed in Kerberos ...
It was discovered that the kpasswd service running on UDP port 464 could respond to response packets, creating a packet loop and a denial of service condition For the oldstable distribution (squeeze), this problem has been fixed in version 183+dfsg-4squeeze7 For the stable distribution (wheezy), this problem has been fixed in version 1101+dfs ...
It was found that kadmind's kpasswd service did not perform any validation on incoming network packets, causing it to reply to all requests A remote attacker could use this flaw to send spoofed packets to a kpasswd service that appear to come from kadmind on a different server, causing the services to keep replying packets to each other, consuming ...