The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request.
References
Link | Resource |
---|---|
http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527 | Vendor Advisory |
http://secunia.com/advisories/55040 | Third Party Advisory |
http://web.mit.edu/kerberos/www/krb5-1.10/ | Release Notes Vendor Advisory |
https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c | Patch Third Party Advisory |
http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527 | Vendor Advisory |
http://secunia.com/advisories/55040 | Third Party Advisory |
http://web.mit.edu/kerberos/www/krb5-1.10/ | Release Notes Vendor Advisory |
https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527 - Vendor Advisory | |
References | () http://secunia.com/advisories/55040 - Third Party Advisory | |
References | () http://web.mit.edu/kerberos/www/krb5-1.10/ - Release Notes, Vendor Advisory | |
References | () https://github.com/krb5/krb5/commit/db64ca25d661a47b996b4e2645998b5d7f0eb52c - Patch, Third Party Advisory |
Information
Published : 2013-03-05 04:54
Updated : 2024-11-21 01:36
NVD link : CVE-2012-1016
Mitre link : CVE-2012-1016
CVE.ORG link : CVE-2012-1016
JSON object : View
Products Affected
mit
- kerberos_5
CWE
CWE-476
NULL Pointer Dereference