SB2011102104 - Multiple vulnerabilities in MIT Kerberos 5
Published: October 21, 2011 Updated: May 27, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: CVE-2011-1527)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions.
2) Input validation error (CVE-ID: CVE-2011-1528)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.
3) NULL pointer dereference (CVE-ID: CVE-2011-1529)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via vectors that trigger certain process_as_req errors.
Remediation
Install update from vendor's website.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629558
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt
- http://www.kb.cert.org/vuls/id/659251
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:159
- http://www.redhat.com/support/errata/RHSA-2011-1379.html
- http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:160
- https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/715579