KDC DoS in cross-realm referral processing
If you are currently using MIT krb5 release krb5-1.7, a null pointer dereference has been reported where an unauthenticated remote attacker could cause the KDC to crash (DoS). This is not a vulnerability in the Kerberos protocol. A patch and a workaround has been made available here.
-----------
Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot org
Keywords: Kerberos KDC DoS
0 comment(s)
×
Diary Archives
Comments