Upstream information

CVE-2013-1416 at MITRE

Description

The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 4 4
Vector AV:N/AC:L/Au:S/C:N/I:N/A:P AV:N/AC:L/Au:S/C:N/I:N/A:P
Access Vector Network Network
Access Complexity Low Low
Authentication Single Single
Confidentiality Impact None None
Integrity Impact None None
Availability Impact Partial Partial
SUSE Bugzilla entries: 770172 [REOPENED], 816413 [RESOLVED / FIXED]

SUSE Security Advisories:


Status of this issue by product and package

Product(s) Source package State
OpenStack Cloud Magnum Orchestration 7.0 krb5 Not affected
SUSE Linux Enterprise Desktop 12 SP1 krb5 Unsupported
SUSE Linux Enterprise Desktop 12 SP2 krb5 Not affected
SUSE Linux Enterprise SDK 11 SP4 krb5 Not affected
SUSE Linux Enterprise SDK 12 SP1 krb5 Unsupported
SUSE Linux Enterprise SDK 12 SP2 krb5 Not affected
SUSE Linux Enterprise Server 11 SP3 LTSS krb5 Not affected
SUSE Linux Enterprise Server 11 SP4 krb5 Not affected
SUSE Linux Enterprise Server 12 GA krb5 Not affected
SUSE Linux Enterprise Server 12 SP1 krb5 Unsupported
SUSE Linux Enterprise Server 12 SP2 krb5 Not affected