Input validation error in Kerberos 5 - CVE-2011-1528
Published: October 21, 2011 / Updated: May 27, 2022
Kerberos 5
Detailed vulnerability description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.
How to mitigate CVE-2011-1528
Sources
- http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt
- http://www.kb.cert.org/vuls/id/659251
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:159
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:160
- http://www.redhat.com/support/errata/RHSA-2011-1379.html
- https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/715579