Lucene search

K
ubuntuUbuntuUSN-881-1
HistoryJan 12, 2010 - 12:00 a.m.

Kerberos vulnerability

2010-01-1200:00:00
ubuntu.com
37

7.5 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.121 Low

EPSS

Percentile

95.3%

Releases

  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04
  • Ubuntu 6.06

Packages

  • krb5 -

Details

It was discovered that Kerberos did not correctly handle invalid AES
blocks. An unauthenticated remote attacker could send specially crafted
traffic that would crash the KDC service, leading to a denial of service,
or possibly execute arbitrary code with root privileges.

OSVersionArchitecturePackageVersionFilename
Ubuntu9.10noarchlibk5crypto3< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-admin-server< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-clients< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-ftpd< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-kdc< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-kdc-ldap< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-pkinit< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-rsh-server< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-telnetd< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Ubuntu9.10noarchkrb5-user< 1.7dfsg~beta3-1ubuntu0.3UNKNOWN
Rows per page:
1-10 of 671

7.5 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.121 Low

EPSS

Percentile

95.3%