Input validation error in Kerberos 5 - CVE-2013-1415
Published: March 5, 2013 / Updated: May 27, 2022
Vulnerability identifier: #VU43038
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2013-1415
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: MIT
Affected software:
Kerberos 5
Kerberos 5
Detailed vulnerability description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
How to mitigate CVE-2013-1415
Install update from vendor's website.
Sources
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7570
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7577
- http://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html
- http://secunia.com/advisories/55040
- http://web.mit.edu/kerberos/www/krb5-1.10/
- http://web.mit.edu/kerberos/www/krb5-1.11/
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
- https://github.com/krb5/krb5/commit/f249555301940c6df3a2cdda13b56b5674eebc2e