6.8

CVE-2010-1321

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MitKerberos 5 Version <= 1.7.1
MitKerberos 5 Version >= 1.8 < 1.8.2
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04
OracleDatabase Server Version-
OpensuseOpensuse Version11.0
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
SuseLinux Enterprise Server Version10 Updatesp3 SwEdition-
SuseLinux Enterprise Server Version11 Update-
SuseLinux Enterprise Server Version11 Updatesp1
FedoraprojectFedora Version11
FedoraprojectFedora Version12
FedoraprojectFedora Version13
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.2% 0.837
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8 6.9
AV:N/AC:L/Au:S/C:N/I:N/A:C
CWE-476 NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.

http://marc.info/?l=bugtraq&m=134254866602253&w=2
Third Party Advisory
Issue Tracking
http://www.us-cert.gov/cas/techalerts/TA10-287A.html
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/40235
Third Party Advisory
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA11-201A.html
Third Party Advisory
US Government Resource