The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629558 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:159 | vendor advisory |
http://www.kb.cert.org/vuls/id/659251 | third party advisory us government resource |
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2011-1379.html | vendor advisory |