MEDIUM · 6.8

CVE-2010-1321

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not pro...

Vulnerability Description

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

CVSS Score

6.8

MEDIUM

AV:N/AC:L/Au:S/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
MitKerberos 5<= 1.7.1
DebianDebian Linux5.0
CanonicalUbuntu Linux6.06
OracleDatabase Server-
OpensuseOpensuse11.0
SuseLinux Enterprise Server10
FedoraprojectFedora11

Related Weaknesses (CWE)

References

FAQ

What is CVE-2010-1321?

CVE-2010-1321 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not pro...

How severe is CVE-2010-1321?

CVE-2010-1321 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-1321?

Check the references section above for vendor advisories and patch information. Affected products include: Mit Kerberos 5, Debian Debian Linux, Canonical Ubuntu Linux, Oracle Database Server, Opensuse Opensuse.