Red Hat Bugzilla – Bug 674325
CVE-2011-0284 krb5 (krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
Last modified: 2016-06-02 15:42:04 EDT
A double-free flaw was found in the way the MIT Kerberos
KDC handled initial authentication requests (AS-REQ), when
the KDC was configured to provide the PKINIT capability.
A remote attacker could use this flaw to cause the KDC
daemon to abort by using a specially-crafted AS-REQ request.
Different vulnerability than CVE-2010-1320 and CVE-2005-1174.
Created attachment 476397 [details]
Proposed patch from Nalin Dahyabhai to fix the issue
This issue did NOT affect the versions of the krb5 package, as shipped
with Red Hat Enterprise Linux 3, 4, or 5.
This issue affects the version of the krb5 package, as shipped
with Red Hat Enterprise Linux 6.
This issue affects the versions of the krb5 package, as shipped with
Fedora release of 13 and 14.
The CVE identifier of CVE-2011-0284 has been assigned to this issue.
Public now via:
This issue has been addressed in following products:
Red Hat Enterprise Linux 6
Via RHSA-2011:0356 https://rhn.redhat.com/errata/RHSA-2011-0356.html
Created krb5 tracking bugs for this issue
Affects: fedora-all [bug 688094]