CVE-2000-0549
CVSS5.0
发布时间 :2000-06-09 00:00:00
修订时间 :2008-09-10 15:05:01
NMCO    

[原文]Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request.


[CNNVD]Kerberos4 KDC AUTH_MSG_KDC_REQUEST无效终止漏洞(CNNVD-200006-048)

        Kerberos 4 KDC程序无法正确检查出AUTH_MSG_KDC_REQUEST请求的无效终止。远程攻击者借助畸形请求导致拒绝服务。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:cygnus:cygnus_network_security:4.0
cpe:/a:mit:kerberos:5_1.1.1MIT Kerberos 5 1.1.1
cpe:/a:mit:kerberos:4.0MIT Kerberos 4 4.0
cpe:/a:mit:kerberos:5-1.1MIT Kerberos 5 5.0_1.1
cpe:/a:cygnus:kerbnet:5.0
cpe:/a:mit:kerberos:5_1.0MIT Kerberos 5 krb5_1.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0549
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0549
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200006-048
(官方数据源) CNNVD

- 其它链接及资源

http://www.cert.org/advisories/CA-2000-11.html
(VENDOR_ADVISORY)  CERT  CA-2000-11
http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html
(VENDOR_ADVISORY)  BUGTRAQ  20000609 Security Advisory: MULTIPLE DENIAL OF SERVICE VULNERABILITIES IN KRB4 KDC
http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt
(UNKNOWN)  CONFIRM  http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt
http://www.redhat.com/support/errata/RHSA-2000-031.html
(UNKNOWN)  REDHAT  RHSA-2000:031
http://ciac.llnl.gov/ciac/bulletins/k-051.shtml
(UNKNOWN)  CIAC  K-051

- 漏洞信息

Kerberos4 KDC AUTH_MSG_KDC_REQUEST无效终止漏洞
中危 未知
2000-06-09 00:00:00 2005-07-26 00:00:00
远程  
        Kerberos 4 KDC程序无法正确检查出AUTH_MSG_KDC_REQUEST请求的无效终止。远程攻击者借助畸形请求导致拒绝服务。

- 公告与补丁

        

- 漏洞信息

4886
MIT Kerberos 4 Key Distribution Center (KDC) AUTH_MSG_KDC_REQUEST DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown

- 漏洞描述

Kerberos contains a flaw that may allow a remote denial of service. The issue is triggered when a non-null terminated AUTH_MSG_KDC_REQUEST is recieved by the KDC, and will result in loss of availability for the KDC

- 时间线

2000-06-09 2000-06-09
Unknow Unknow

- 解决方案

There are several solutions for mitigating this vulnerability. The first option users have is to upgrade to MIT Kerberos 5 version 1.2, as it has been reported to fix this vulnerability. Users who have the option to recompile Kerberos from source can apply the vendor supplied patches obtained from the following URL: http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt Those implementations of Kerberos from vendors other than MIT should consult the specific vendor for the availability of patch information. It is also possible to correct the flaw by implementing the following workaround(s): 1. Kerberos version 4 authentication can be disabled at run time by supplying command-line options to the KDC server. Consult the help pages for Kerberos to obtain the exact syntax to disable authentication. 2. Again for those user who have the option to recompile the Kerberos software can in fact recompile with the option '--without-krb4' to disable all Kerberos version 4 ticket handling in Kerberos version 5

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站