CVE-2010-1321 : Detail

CVE-2010-1321

Memory Corruption
7.04%V3
Network
2010-05-19
16h13 +00:00
2018-10-10
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:L/Au:S/C:N/I:N/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Mit>>Kerberos_5 >> Version To (including) 1.7.1

Mit>>Kerberos_5 >> Version From (including) 1.8 To (excluding) 1.8.2

Configuraton 0

Debian>>Debian_linux >> Version 5.0

Debian>>Debian_linux >> Version 6.0

Configuraton 0

Canonical>>Ubuntu_linux >> Version 6.06

Canonical>>Ubuntu_linux >> Version 8.04

Canonical>>Ubuntu_linux >> Version 9.04

Canonical>>Ubuntu_linux >> Version 9.10

Canonical>>Ubuntu_linux >> Version 10.04

Configuraton 0

Oracle>>Database_server >> Version -

Configuraton 0

Opensuse>>Opensuse >> Version 11.0

Opensuse>>Opensuse >> Version 11.1

Opensuse>>Opensuse >> Version 11.2

Opensuse>>Opensuse >> Version 11.3

Suse>>Linux_enterprise_server >> Version 10

Suse>>Linux_enterprise_server >> Version 11

Suse>>Linux_enterprise_server >> Version 11

Configuraton 0

Fedoraproject>>Fedora >> Version 11

Fedoraproject>>Fedora >> Version 12

Fedoraproject>>Fedora >> Version 13

References

http://secunia.com/advisories/39818
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0134
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/39784
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-940-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://marc.info/?l=bugtraq&m=134254866602253&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.mandriva.com/security/advisories?name=MDVSA-2010:100
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.us-cert.gov/cas/techalerts/TA11-201A.html
Tags : third-party-advisory, x_refsource_CERT
http://www.redhat.com/support/errata/RHSA-2010-0770.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/40685
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/40235
Tags : vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2010/1574
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2010/1192
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/39799
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/1196
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/39849
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0987.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/44954
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-940-2
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/42432
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/39762
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2011-0880.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2010-0873.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2010/1177
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/42974
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/3112
Tags : vdb-entry, x_refsource_VUPEN
http://www.us-cert.gov/cas/techalerts/TA10-287A.html
Tags : third-party-advisory, x_refsource_CERT
http://secunia.com/advisories/43335
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2010/dsa-2052
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2010-0423.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2010/1882
Tags : vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2011-0152.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/40346
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/41967
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0807.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2010-0935.html
Tags : vendor-advisory, x_refsource_REDHAT
http://osvdb.org/64744
Tags : vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2010/1222
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2010/1193
Tags : vdb-entry, x_refsource_VUPEN