Lucene search

K
cve[email protected]CVE-2010-1321
HistoryMay 19, 2010 - 6:30 p.m.

CVE-2010-1321

2010-05-1918:30:03
CWE-476
web.nvd.nist.gov
64
mit kerberos 5
gss-api library
denial of service
cve-2010-1321

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

5.4 Medium

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.3%

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator’s checksum field is missing.

Affected configurations

NVD
Node
mitkerberos_5Range1.7.1
OR
mitkerberos_5Range1.81.8.2
Node
debiandebian_linuxMatch5.0
OR
debiandebian_linuxMatch6.0
Node
canonicalubuntu_linuxMatch6.06
OR
canonicalubuntu_linuxMatch8.04
OR
canonicalubuntu_linuxMatch9.04
OR
canonicalubuntu_linuxMatch9.10
OR
canonicalubuntu_linuxMatch10.04
Node
oracledatabase_serverMatch-
Node
opensuseopensuseMatch11.0
OR
opensuseopensuseMatch11.1
OR
opensuseopensuseMatch11.2
OR
opensuseopensuseMatch11.3
OR
suselinux_enterprise_serverMatch10sp3-
OR
suselinux_enterprise_serverMatch11-
OR
suselinux_enterprise_serverMatch11sp1
Node
fedoraprojectfedoraMatch11
OR
fedoraprojectfedoraMatch12
OR
fedoraprojectfedoraMatch13

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

5.4 Medium

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.3%