Kerberos Server Spoofed Packet Amplification DoS (PingPong)

High Nessus Plugin ID 10640


The remote service is vulnerable to a denial of service attack.


The remote host is running a Kerberos server that seems to be vulnerable to a 'ping-pong' attack.

When contacted on the UDP port, this service always responds, even to malformed requests. This makes it possible to involve it in a 'ping-pong' attack, in which an attacker spoofs a packet between two machines running this service, causing them to spew characters at each other, slowing the machines down and saturating the network.


Upgrade to krb5-1.11.3 or later. Additionally, you can disable this service if it is not required.

See Also


Plugin Details

Severity: High

ID: 10640

File Name: krb_pingpong.nasl

Version: $Revision: 1.22 $

Type: remote

Family: Misc.

Published: 2001/03/25

Modified: 2016/04/28

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1996/02/08

Reference Information

CVE: CVE-2002-2443

OSVDB: 93240