The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2010-05-19 18:30
Updated : 2021-02-02 18:53
NVD link : CVE-2010-1321
Mitre link : CVE-2010-1321
CVE.ORG link : CVE-2010-1321
JSON object : View
Products Affected
suse
- linux_enterprise_server
canonical
- ubuntu_linux
fedoraproject
- fedora
opensuse
- opensuse
debian
- debian_linux
mit
- kerberos_5
oracle
- database_server
CWE
CWE-476
NULL Pointer Dereference