Vulnerability Description
The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mit | Kerberos 5 | 1.10 |
References
- http://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txtPatchVendor Advisory
- http://www.debian.org/security/2012/dsa-2518
- http://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txtPatchVendor Advisory
- http://www.debian.org/security/2012/dsa-2518
FAQ
What is CVE-2012-1014?
CVE-2012-1014 is a vulnerability with a CVSS score of 9.0 (HIGH). The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to caus...
How severe is CVE-2012-1014?
CVE-2012-1014 has been rated HIGH with a CVSS base score of 9.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-1014?
Check the references section above for vendor advisories and patch information. Affected products include: Mit Kerberos 5.