FreeBSD : krb5 -- KDC NULL pointer dereference in TGS handling (6c7d9a35-2608-11e1-89b4-001ec9578670)

medium Nessus Plugin ID 57293

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The MIT Kerberos Team reports :

In releases krb5-1.9 and later, the KDC can crash due to a NULL pointer dereference in code that handles TGS (Ticket Granting Service) requests. The trigger condition is trivial to produce using unmodified client software, but requires the ability to authenticate as a principal in the KDC's realm.

Solution

Update the affected package.

See Also

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2011-007.txt

http://www.nessus.org/u?d5246cfe

Plugin Details

Severity: Medium

ID: 57293

File Name: freebsd_pkg_6c7d9a35260811e189b4001ec9578670.nasl

Version: 1.9

Type: local

Published: 12/14/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:krb5, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/14/2011

Vulnerability Publication Date: 12/11/2011

Reference Information

CVE: CVE-2011-1530