Lucene search

K
osvGoogleOSV:DSA-2518-1
HistoryJul 31, 2012 - 12:00 a.m.

krb5 - denial of service

2012-07-3100:00:00
Google
osv.dev
7

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.118 Low

EPSS

Percentile

94.5%

Emmanuel Bouillon from NCI Agency discovered multiple vulnerabilities in MIT
Kerberos, a daemon implementing the network authentication protocol.

  • CVE-2012-1014
    By sending specially crafted AS-REQ (Authentication Service Request) to a KDC
    (Key Distribution Center), an attacker could make it free an uninitialized
    pointer, corrupting the heap. This can lead to process crash or even arbitrary
    code execution.

This CVE only affects testing (wheezy) and unstable (sid) distributions.

  • CVE-2012-1015
    By sending specially crafted AS-REQ to a KDC, an attacker could make it
    dereference an uninitialized pointer, leading to process crash or even
    arbitrary code execution

In both cases, arbitrary code execution is believed to be difficult to achieve,
but might not be impossible.

For the stable distribution (squeeze), this problem has been fixed in
version 1.8.3+dfsg-4squeeze6.

For the testing distribution (wheezy), this problem has been fixed in
version 1.10.1+dfsg-2.

For the unstable distribution (sid), this problem has been fixed in
version 1.10.1+dfsg-2.

We recommend that you upgrade your krb5 packages.

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.118 Low

EPSS

Percentile

94.5%