Summary
This host is installed with Kerberos5 and is prone to Denial of Service vulnerability.
Impact
Successful exploitation will allow attacker to cause a denial of service.
Impact level: Application
Solution
Upgrade kerberos5 version 1.7.1 or Apply patch from below link, http://web.mit.edu/kerberos/www/
http://web.mit.edu/kerberos/advisories/2009-003-patch.txt
*****
NOTE: Ignore this warning if above mentioned patch is already applied.
*****
Insight
The flaw is caused by a NULL pointer dereference error in the KDC cross-realm referral processing implementation, which could allow an unauthenticated remote attacker to cause KDC to crash.
Affected
kerberos5 version prior to 1.7.1
References
Severity
Classification
-
CVE CVE-2009-3295 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- Denial Of Service Vulnerability in OpenSSL June-09 (Linux)
- FreeRADIUS Tunnel-Password Denial Of Service Vulnerability
- EtherApe RPC Packet Processing Denial of Service Vulnerability
- ClamAV Hash Manager Off-By-One Denial of Service Vulnerability (Win)
- Eggdrop Server Module Message Handling Remote Buffer Overflow Vulnerability