CVE-2010-0629Use After Free in Kerberos 5

CWE-416Use After Free8 documents8 sources
Severity
6.5MEDIUMNVD
EPSS
2.3%
top 15.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 7
Latest updateMay 2

Description

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

Debianmit/krb5< 1.7+dfsg-1+3
NVDmit/kerberos_51.51.6.3
NVDopensuse/opensuse11.0, 11.1+1

Also affects: Fedora 11, Linux Enterprise 11.0, Ubuntu Linux 8.04, 8.10, 9.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-6243-f9c4-77f4: Use-after-free vulnerability in kadmin/server/server_stubs2022-05-02
OSV
CVE-2010-0629: Use-after-free vulnerability in kadmin/server/server_stubs2010-04-07
CVEList
CVE-2010-0629: Use-after-free vulnerability in kadmin/server/server_stubs2010-04-07

📋Vendor Advisories

3
Ubuntu
Kerberos vulnerabilities2010-04-07
Red Hat
krb5: kadmind use-after-free remote crash (MITKRB5-SA-2010-003)2010-01-26
Debian
CVE-2010-0629: krb5 - Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT K...2010

💬Community

1
Bugzilla
CVE-2010-0629 krb5: kadmind use-after-free remote crash (MITKRB5-SA-2010-003)2010-03-23
CVE-2010-0629 — Use After Free in MIT Kerberos 5 | cvebase