Lucene search

K
ciscoCiscoCISCO-SA-20100519-CVE-2010-1321
HistoryMay 19, 2010 - 3:40 p.m.

MIT Kerberos GSS-API Library Remote Denial of Service Vulnerability

2010-05-1915:40:37
tools.cisco.com
33

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.966 High

EPSS

Percentile

99.6%

MIT Kerberos contains a vulnerability that could allow an authenticated, remote attacker to cause a denial of service (DoS) condition.

The vulnerability is in the GSS-API acceptor component due to lack of pointer validation. An authenticated, remote attacker could exploit the vulnerability by making a crafted request to the affected component. This action could cause the component to crash, resulting in a DoS condition.

MIT has confirmed this vulnerability and released updated software.

The vulnerability can be exploited only by an authenticated attacker, which somewhat reduces the threat of an attack on affected systems.

Cisco Network Admission Control Guest Server may be affected if Active Directory single sign-on is enabled.

Affected configurations

Vulners
Node
cisconetwork_admission_controlMatchany
OR
cisconetwork_admission_controlMatchany

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.966 High

EPSS

Percentile

99.6%