A double-free flaw was found in the way the MIT Kerberos KDC handled initial authentication requests (AS-REQ), when the KDC was configured to provide the PKINIT capability. A remote attacker could use this flaw to cause the KDC daemon to abort by using a specially-crafted AS-REQ request. Different vulnerability than CVE-2010-1320 and CVE-2005-1174.
Created attachment 476397 [details] Proposed patch from Nalin Dahyabhai to fix the issue
This issue did NOT affect the versions of the krb5 package, as shipped with Red Hat Enterprise Linux 3, 4, or 5. This issue affects the version of the krb5 package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the krb5 package, as shipped with Fedora release of 13 and 14.
The CVE identifier of CVE-2011-0284 has been assigned to this issue.
Public now via: http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2011-003.txt
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0356 https://rhn.redhat.com/errata/RHSA-2011-0356.html
Created krb5 tracking bugs for this issue Affects: fedora-all [bug 688094]