{"vuid":"VU#587579","idnumber":"587579","name":"MIT Kerberos V5 ASN.1 decoder fails to perform bounds checking on data element length fields","keywords":["ASN.1","ASN","parser","integer overflow","krb5","kerberos"],"overview":"The MIT Kerberos V5 implementation contains an ASN.1 decoding flaw that may allow remote attackers to crash affected Kerberos applications.","clean_desc":"Kerberos V5 protocol messages are defined using Abstract Syntax Notation One (ASN.1), a formal language that allows protocol specifications to be easily encoded for network transmission. For example, each data element in a given protocol message is encoded with additional information that indicates the type and length of the supplied data. This standardized format allows the recipient of the message to interpret the data elements and handle them appropriately. The ASN.1 decoder included with MIT Kerberos V5 fails to perform bounds checking on the length values supplied with each data element. In some cases, an incoming message can contain a large unsigned data element length value that is misinterpreted as a negative signed value. When an affected Key Distribution Center (KDC) or other Kerberos application attempts to allocate negative or unreasonably large amounts of storage, an error condition will occur that may cause the application to crash.","impact":"This vulnerability allows remote attackers to crash affected applications, resulting in a denial of service condition.","resolution":"This vulnerability was addressed in MIT Kerberos V5 1.2.5, released on April 30, 2002. MIT krb5 Security Advisory 2003-001 provides additional information from MIT and is available at: http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-001-multiple.txt For information regarding other vendors who may be affected, please see the vendor section  of this document.","workarounds":"","sysaffected":"","thanks":"The reporter of this vulnerability wishes to remain anonymous.","author":"This document was written by Jeffrey P. Lanza.","public":["http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-001-multiple.txt","http://www.ietf.org/rfc/rfc1510.txt"],"cveids":["CVE-2002-0036"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-04-04T14:22:19Z","publicdate":"2003-01-28T00:00:00Z","datefirstpublished":"2003-01-31T19:02:47Z","dateupdated":"2003-04-04T20:02:10Z","revision":43,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"10","cam_easeofexploitation":"14","cam_attackeraccessrequired":"20","cam_scorecurrent":"31.5","cam_scorecurrentwidelyknown":"35.4375","cam_scorecurrentwidelyknownexploited":"43.3125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":31.5,"vulnote":null}