Kerberos kpasswd UDP Processing Vulnerability
RISK: High Risk
TYPE: Operating Systems - Networks OS
A vulnerability has been identifitied in MIT Kerberos. A remote user can cause denial of service conditions.
A remote user can send spoofed UDP packets to a target kadmind server running kpasswd to cause kpasswd to pass the UDP packets to the spoofed address and reply to the packets, consume excessive CPU resources and bandwidth.
This type of exploit is known as a UDP ping-pong attack.
Impact
- Denial of Service
System / Technologies affected
- Linux (Any)
- UNIX (Any)
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor plans to issue a fix in future version krb5-1.11.3.
- The vendor has issued a source code fix, available at:
https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
Vulnerability Identifier
Source
Related Link
Share with