5
CVSSv2

CVE-2011-0281

Published: 10/02/2011 Updated: 21/01/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x up to and including 1.9, when an LDAP backend is used, allows remote malicious users to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 1.6.1

mit kerberos 5 1.6.2

mit kerberos 5 1.8.3

mit kerberos 5 1.9

mit kerberos 5-1.6.3

mit kerberos 5 1.7

mit kerberos 5 1.6

mit kerberos 5 1.8.1

mit kerberos 5 1.8.2

mit kerberos 5 1.7.1

mit kerberos 5 1.8

Vendor Advisories

Keiichi Mori discovered that the MIT krb5 KDC database propagation daemon (kpropd) is vulnerable to a denial of service attack due to improper logic when a worker child process exited because of invalid network input This could only occur when kpropd is running in standalone mode; kpropd was not affected when running in incremental propagation mod ...
Debian Bug report logs - #618517 krb5: CVE-2011-0284 kdc double-free Package: krb5; Maintainer for krb5 is Sam Hartman <hartmans@debianorg>; Reported by: Michael Gilbert <michaelsgilbert@gmailcom> Date: Tue, 15 Mar 2011 20:51:05 UTC Severity: serious Tags: security Found in version 183+dfsg-4 Fixed in versions ...
Debian Bug report logs - #622681 krb5: kadmind invalid pointer free Package: krb5-admin-server; Maintainer for krb5-admin-server is Sam Hartman <hartmans@debianorg>; Source for krb5-admin-server is src:krb5 (PTS, buildd, popcon) Reported by: Michael Gilbert <michaelsgilbert@gmailcom> Date: Wed, 13 Apr 2011 19:21: ...