Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

Kerberos5 KDC Cross Realm Referral Denial of Service Vulnerability
Information
Severity
Severity
Medium
Family
Family
Denial of Service
CVSSv2 Base
CVSSv2 Base
5.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
Solution Type
Solution Type
Vendor Patch
Created
Created
13 years ago
Modified
Modified
4 years ago
Summary
This host is installed with Kerberos5 and is prone to Denial of Service vulnerability.
Insight
Insight
The flaw is caused by a NULL pointer dereference error in the KDC cross-realm referral processing implementation, which could allow an unauthenticated remote attacker to cause KDC to crash.
Affected Software
Affected Software
kerberos5 version prior to 1.7.1
Solution
Solution
Upgrade kerberos5 version 1.7.1 ***** NOTE: Ignore this warning if above mentioned patch is already applied. *****