CVE-2010-1324

EUVD-2010-1353
MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
mitkerberos_5
1.7
mitkerberos_5
1.7.1
mitkerberos_5
1.8
mitkerberos_5
1.8.1
mitkerberos_5
1.8.2
mitkerberos_5
1.8.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
krb5
bookworm
1.20.1-2+deb12u2
fixed
bookworm (security)
1.20.1-2+deb12u2
fixed
bullseye
1.18.3-6+deb11u5
fixed
bullseye (security)
1.18.3-6+deb11u5
fixed
lenny
not-affected
sid
1.21.3-3
fixed
trixie
1.21.3-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
krb5
dapper
not-affected
hardy
not-affected
karmic
Fixed 1.7dfsg~beta3-1ubuntu0.7
released
lucid
Fixed 1.8.1+dfsg-2ubuntu0.4
released
maverick
Fixed 1.8.1+dfsg-5ubuntu0.2
released
Common Weakness Enumeration
References