Vigil@nce: Solaris, denial of service of Kerberos
December 2008 by Vigil@nce
SYNTHESIS
A local attacker can prevent users from authenticating on Kerberos.
Gravity: 1/4
Consequences: denial of service of service
Provenance: user shell
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 12/12/2008
IMPACTED PRODUCTS
– OpenSolaris
– Sun Solaris
– Sun Trusted Solaris
DESCRIPTION
The Solaris Kerberos service handles authentication on the
network. The pam_krb5 module queries the Kerberos service to
authenticate users on the system.
When a user re-authenticates, the store_cred feature of pam_krb5
does not update the cache of authentication data. Following users
can then never authenticate.
A local attacker can therefore prevent users from authenticating
on Kerberos.
CHARACTERISTICS
Identifiers: 244866, 6691206, VIGILANCE-VUL-8329