---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Kerberos kadmind Denial of Service Vulnerability SECUNIA ADVISORY ID: SA39315 VERIFY ADVISORY: http://secunia.com/advisories/39315/ DESCRIPTION: A vulnerability has been reported in Kerberos 5, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to the "init_2_svc()" function in src/kadmin/server/server_stubs.c calling the "krb5_get_error_message()" function on previously freed handles, which can be exploited to crash the Kerberos administration daemon (kadmind) by e.g. sending an unknown kadmin API version number. The vulnerability is reported in krb5-1.5 through krb5-1.6.3. krb5-1.7 versions are not affected. SOLUTION: Update to version 1.7 or later or apply patch. Also fixed in the SVN repository. http://web.mit.edu/kerberos/advisories/2010-003-patch.txt.asc PROVIDED AND/OR DISCOVERED BY: Previously known via MIT krb5 bug #5998. Security impact realised after Sol Jerome reported a crash to Debian. ORIGINAL ADVISORY: MIT: http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2010-003.txt http://krbdev.mit.edu/rt/Ticket/Display.html?id=5998 Sol Jerome (Debian Bug #567052): http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567052 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------