Zero Day Initiative - CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy
Briefly

The article discusses a critical vulnerability identified in the Microsoft Windows Key Distribution Center (KDC) Proxy, specifically CVE-2024-43639. This integer overflow vulnerability originates from a lack of checks for Kerberos response length. If exploited by a remote, unauthenticated attacker, it enables the KDC proxy to forward compromised Kerberos requests to a server, leading to possible arbitrary code execution within the target service's security context. This situation highlights the risks associated with the Kerberos authentication protocol, utilized within Active Directory systems and requiring a trusted third party for secure identity verification.
The vulnerability exists due to an integer overflow caused by a missing check for Kerberos response length, allowing for arbitrary code execution by unauthenticated attackers.
Successful exploitation of the vulnerability in the Microsoft Windows KDC Proxy could lead to an attacker executing arbitrary code within the security context of the target service.
Read at Zero Day Initiative
[
|
]