10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
krb5 is vulnerable to arbitrary code execution. Multiple integer underflow flaws, leading to heap-based corruption, were found in the way the MIT Kerberos Key Distribution Center (KDC) decrypted ciphertexts encrypted with the Advanced Encryption Standard (AES) and ARCFOUR (RC4) encryption algorithms. If a remote KDC client were able to provide a specially-crafted AES- or RC4-encrypted ciphertext or texts, it could potentially lead to either a denial of service of the central KDC (KDC crash or abort upon processing the crafted ciphertext), or arbitrary code execution with the privileges of the KDC (i.e., root privileges).
lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
lists.fedoraproject.org/pipermail/package-announce/2010-January/033915.html
lists.fedoraproject.org/pipermail/package-announce/2010-January/033919.html
marc.info/?l=bugtraq&m=130497213107107&w=2
secunia.com/advisories/38080
secunia.com/advisories/38108
secunia.com/advisories/38126
secunia.com/advisories/38140
secunia.com/advisories/38184
secunia.com/advisories/38203
secunia.com/advisories/38696
secunia.com/advisories/40220
sunsolve.sun.com/search/document.do?assetkey=1-66-275530-1
sunsolve.sun.com/search/document.do?assetkey=1-77-1021779.1-1
support.apple.com/kb/HT4188
support.avaya.com/css/P8/documents/100074869
ubuntu.com/usn/usn-881-1
web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt
www.debian.org/security/2010/dsa-1969
www.mandriva.com/security/advisories?name=MDVSA-2010:006
www.redhat.com/security/updates/classification/#critical
www.securityfocus.com/bid/37749
www.securitytracker.com/id?1023440
www.vupen.com/english/advisories/2010/0096
www.vupen.com/english/advisories/2010/0129
www.vupen.com/english/advisories/2010/1481
access.redhat.com/errata/RHSA-2010:0029
bugzilla.redhat.com/show_bug.cgi?id=545015
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11272
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7357
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8192
rhn.redhat.com/errata/RHSA-2010-0029.html
rhn.redhat.com/errata/RHSA-2010-0095.html