Lucene search

K
ubuntuUbuntuUSN-1290-1
HistoryDec 08, 2011 - 12:00 a.m.

Kerberos vulnerability

2011-12-0800:00:00
ubuntu.com
36

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

AI Score

6.4

Confidence

High

EPSS

0.013

Percentile

86.0%

Releases

  • Ubuntu 11.10

Packages

  • krb5 - MIT Kerberos Network Authentication Protocol

Details

Simo Sorce discovered that a NULL pointer dereference existed in
the Kerberos Key Distribution Center (KDC). An authenticated remote
attacker could use this to cause a denial of service.

OSVersionArchitecturePackageVersionFilename
Ubuntu11.10noarchkrb5-kdc< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchkrb5-admin-server< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchkrb5-gss-samples< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchkrb5-kdc-ldap< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchkrb5-multidev< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchkrb5-pkinit< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchkrb5-user< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchlibgssapi-krb5-2< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchlibgssrpc4< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchlibk5crypto3< 1.9.1+dfsg-1ubuntu2.2UNKNOWN
Rows per page:
1-10 of 171

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

AI Score

6.4

Confidence

High

EPSS

0.013

Percentile

86.0%