Overview
MIT's KRB5 KDC version 1.8 and 1.9 contain multiple vulnerabilities.
Description
The MIT krb5 Security Advisory 2011-006 states: CVE-2011-1527: In releases krb5-1.9 and later, the KDC can crash due to a null pointer dereference if configured to use the LDAP back end. A trigger condition is publicly known but not known to be widely circulated. |
Impact
The MIT krb5 Security Advisory 2011-006 states: |
Solution
The MIT krb5 Security Advisory 2011-006 states:
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-006.txt
- http://web.mit.edu/kerberos/advisories/2011-006-patch.txt
- http://web.mit.edu/kerberos/advisories/2011-006-patch.txt.asc
- http://web.mit.edu/kerberos/advisories/2011-006-patch-r18.txt
- http://web.mit.edu/kerberos/advisories/2011-006-patch-r18.txt.asc
Acknowledgements
This document was written by Michael Orlando.
Other Information
CVE IDs: | CVE-2011-1527, CVE-2011-1528, CVE-2011-1529, CVE-2011-4151 |
Severity Metric: | 8.29 |
Date Public: | 2011-10-18 |
Date First Published: | 2011-10-24 |
Date Last Updated: | 2011-10-24 13:27 UTC |
Document Revision: | 11 |