Lucene search

K
centosCentOS ProjectCESA-2010:0423
HistoryMay 21, 2010 - 10:00 p.m.

krb5 security update

2010-05-2122:00:31
CentOS Project
lists.centos.org
47

6.7 Medium

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

0.007 Low

EPSS

Percentile

80.2%

CentOS Errata and Security Advisory CESA-2010:0423

Kerberos is a network authentication system which allows clients and
servers to authenticate to each other using symmetric encryption and a
trusted third party, the Key Distribution Center (KDC).

A NULL pointer dereference flaw was discovered in the MIT Kerberos Generic
Security Service Application Program Interface (GSS-API) library. A remote,
authenticated attacker could use this flaw to crash any server application
using the GSS-API authentication mechanism, by sending a specially-crafted
GSS-API token with a missing checksum field. (CVE-2010-1321)

Red Hat would like to thank the MIT Kerberos Team for responsibly reporting
this issue. Upstream acknowledges Shawn Emery of Oracle as the original
reporter.

All krb5 users should upgrade to these updated packages, which contain a
backported patch to correct this issue. All running services using the MIT
Kerberos libraries must be restarted for the update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-June/078873.html
https://lists.centos.org/pipermail/centos-announce/2010-June/078874.html
https://lists.centos.org/pipermail/centos-announce/2010-May/078801.html
https://lists.centos.org/pipermail/centos-announce/2010-May/078803.html
https://lists.centos.org/pipermail/centos-announce/2010-May/078805.html
https://lists.centos.org/pipermail/centos-announce/2010-May/078806.html

Affected packages:
krb5-devel
krb5-libs
krb5-server
krb5-workstation

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0423

6.7 Medium

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

0.007 Low

EPSS

Percentile

80.2%