4
CVSSv2

CVE-2013-1416

Published: 19/04/2013 Updated: 02/02/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) prior to 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5

opensuse opensuse 11.4

opensuse opensuse 12.1

opensuse opensuse 12.2

opensuse opensuse 12.3

fedoraproject fedora 17

fedoraproject fedora 18

redhat enterprise linux desktop 6.0

redhat enterprise linux eus 6.4

redhat enterprise linux server 6.0

redhat enterprise linux server aus 6.4

redhat enterprise linux workstation 6.0

Vendor Advisories

Synopsis Moderate: krb5 security update Type/Severity Security Advisory: Moderate Topic Updated krb5 packages that fix one security issue are now available forRed Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerability Scoring ...
Debian Bug report logs - #704775 krb5: KDC TGS-REQ null deref (CVE-2013-1416) Package: krb5-kdc; Maintainer for krb5-kdc is Sam Hartman <hartmans@debianorg>; Source for krb5-kdc is src:krb5 (PTS, buildd, popcon) Reported by: Benjamin Kaduk <kaduk@MITEDU> Date: Fri, 5 Apr 2013 18:36:01 UTC Severity: serious Tags: ...
Several security issues were fixed in Kerberos ...
A NULL pointer dereference flaw was found in the way the MIT Kerberos KDC processed certain TGS (Ticket-granting Server) requests A remote, authenticated attacker could use this flaw to crash the KDC via a specially-crafted TGS request (CVE-2013-1416) ...
The prep_reprocess_req function in do_tgs_reqc in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1105 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request ...