CVE-2010-1321NULL Pointer Dereference in Kerberos 5

Severity
6.8MEDIUMNVD
EPSS
1.9%
top 16.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 19
Latest updateMay 2

Description

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

CVSS vector

AV:N/AC:L/C:N/I:N/A:CExploitability: 8.0 | Impact: 6.9

Affected Packages5 packages

Debianmit/krb5< 1.8.1+dfsg-3+3
NVDmit/kerberos_51.81.8.2+1
Debianheimdal_project/heimdal< 1.4.0~git20100605.dfsg.1-1+3
NVDopensuse/opensuse4 versions+3

Also affects: Debian Linux 5.0, 6.0, Fedora 11, 12, 13, Ubuntu Linux 10.04, 6.06, 8.04, 9.04, 9.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-pcm6-6x97-2mrc: The kg_accept_krb5 function in krb5/accept_sec_context2022-05-02
OSV
CVE-2010-1321: The kg_accept_krb5 function in krb5/accept_sec_context2010-05-19
CVEList
CVE-2010-1321: The kg_accept_krb5 function in krb5/accept_sec_context2010-05-19

📋Vendor Advisories

5
Ubuntu
Kerberos vulnerability2010-07-21
Cisco
MIT Kerberos GSS-API Library Remote Denial of Service Vulnerability2010-05-19
Ubuntu
Kerberos vulnerabilities2010-05-19
Red Hat
krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005)2010-05-18
Debian
CVE-2010-1321: heimdal - The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library ...2010

💬Community

1
Bugzilla
CVE-2010-1321 krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005)2010-04-15
CVE-2010-1321 — NULL Pointer Dereference in Kerberos 5 | cvebase