Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1321

Опубликовано: 19 мая 2010
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

РелизСтатусПримечание
dapper

released

1.4.3-5ubuntu0.11
devel

not-affected

1.8.1+dfsg-5
hardy

released

1.6.dfsg.3~beta1-2ubuntu1.5
jaunty

released

1.6.dfsg.4~beta1-5ubuntu2.4
karmic

released

1.7dfsg~beta3-1ubuntu0.6
lucid

released

1.8.1+dfsg-2ubuntu0.2
upstream

released

1.8.1+dfsg-3

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

6.24-1build0.10.10.1
hardy

released

6.22-0ubuntu1~8.04.1
jaunty

released

6.22-0ubuntu1~9.04.1
karmic

released

6.22-0ubuntu1~9.10.1
lucid

released

6.22-0ubuntu1~10.04
maverick

released

6.22-0ubuntu1~10.10
upstream

released

6.22

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

nvd
около 15 лет назад

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

debian
около 15 лет назад

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-AP ...

github
около 3 лет назад

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

oracle-oval
около 15 лет назад

ELSA-2010-0423: krb5 security update (IMPORTANT)

6.8 Medium

CVSS2