CVE-2010-1321
19.05.2010, 18:30
The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.Enginsight
Vendor | Product | Version |
---|---|---|
mit | kerberos_5 | 𝑥 ≤ 1.7.1 |
mit | kerberos_5 | 1.8 ≤ 𝑥 < 1.8.2 |
debian | debian_linux | 5.0 |
debian | debian_linux | 6.0 |
canonical | ubuntu_linux | 6.06 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 9.04 |
canonical | ubuntu_linux | 9.10 |
canonical | ubuntu_linux | 10.04 |
oracle | database_server | - |
opensuse | opensuse | 11.0 |
opensuse | opensuse | 11.1 |
opensuse | opensuse | 11.2 |
opensuse | opensuse | 11.3 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
heimdal |
| ||||||||||||
krb5 |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
krb5 |
| ||||||||||||
sun-jav6 |
|
Common Weakness Enumeration
References