CVE-2012-1015Improper Input Validation in Kerberos 5

Severity
9.3CRITICALNVD
EPSS
1.2%
top 20.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 6
Latest updateMay 13

Description

The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x before 1.9.5, and 1.10.x before 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free, heap memory corruption, and daemon crash) via a crafted AS-REQ request.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages2 packages

Debianmit/krb5< 1.10.1+dfsg-2+3
NVDmit/kerberos_511 versions+10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-phxm-4gpx-94fr: The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 12022-05-13
CVEList
CVE-2012-1015: The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 12012-08-06
OSV
CVE-2012-1015: The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 12012-08-06

📋Vendor Advisories

3
Red Hat
krb5: KDC daemon crash via free() of an uninitialized pointer2012-07-31
Ubuntu
Kerberos vulnerabilities2012-07-31
Debian
CVE-2012-1015: krb5 - The kdc_handle_protected_negotiation function in the Key Distribution Center (KD...2012

💬Community

2
Bugzilla
CVE-2012-1015 krb5: KDC daemon crash via free() of an uninitialized pointer [fedora-all]2012-07-31
Bugzilla
CVE-2012-1015 krb5: KDC daemon crash via free() of an uninitialized pointer2012-07-06
CVE-2012-1015 — Improper Input Validation in Kerberos 5 | cvebase