CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
97.2%
Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
Vendor | Product | Version | CPE |
---|---|---|---|
mit | kerberos_5 | 1.7 | cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:* |
mit | kerberos_5 | 1.7.1 | cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:* |
mit | kerberos_5 | 1.8 | cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:* |
mit | kerberos_5 | 1.8.1 | cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:* |
mit | kerberos_5 | 1.8.2 | cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:* |
mit | kerberos_5 | 1.8.3 | cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:* |
mit | kerberos_5 | 1.9 | cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
osvdb.org/71183
secunia.com/advisories/43700
secunia.com/advisories/43760
secunia.com/advisories/43783
secunia.com/advisories/43881
securitytracker.com/id?1025216
web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
www.kb.cert.org/vuls/id/943220
www.mandriva.com/security/advisories?name=MDVSA-2011:048
www.redhat.com/support/errata/RHSA-2011-0356.html
www.securityfocus.com/archive/1/517029/100/0/threaded
www.securityfocus.com/bid/46881
www.ubuntu.com/usn/USN-1088-1
www.vupen.com/english/advisories/2011/0672
www.vupen.com/english/advisories/2011/0673
www.vupen.com/english/advisories/2011/0680
www.vupen.com/english/advisories/2011/0722
www.vupen.com/english/advisories/2011/0763
exchange.xforce.ibmcloud.com/vulnerabilities/66101