[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-624 --- krb5

ID: oval:org.secpod.oval:def:1200161Date: (C)2016-01-04   (M)2021-09-11
Class: PATCHFamily: unix




A flaw was found in the OTP kdcpreauth module of MIT Kerberos. A remote attacker could use this flaw to bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal"s long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user"s password.It was found that the krb5_read_message function of MIT Kerberos did not correctly sanitize input, and could create invalid krb5_data objects. A remote, unauthenticated attacker could use this flaw to crash a Kerberos child process via a specially crafted request.

Platform:
Amazon Linux AMI
Product:
krb5
Reference:
ALAS-2015-624
CVE-2015-2694
CVE-2014-5355
CVE    2
CVE-2014-5355
CVE-2015-2694
CPE    2
cpe:/o:amazon:linux
cpe:/a:mit:krb5

© SecPod Technologies