CVE-2009-3295

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.

References

http://secunia.com/advisories/37977

http://securitytracker.com/id?1023392

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-003.txt

http://www.securityfocus.com/archive/1/508622/100/0/threaded

http://www.securityfocus.com/bid/37486

http://www.vupen.com/english/advisories/2009/3652

Details

Source: MITRE

Published: 2009-12-29

Updated: 2020-01-21

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
65120Ubuntu 9.10 : krb5 vulnerability (USN-879-1)NessusUbuntu Local Security Checks
medium
57655GLSA-201201-13 : MIT Kerberos 5: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
44880Fedora 12 : krb5-1.7-15.fc12 (2009-13539)NessusFedora Local Security Checks
medium
44092SuSE 11 Security Update : Kerberos 5 (SAT Patch Number 1796)NessusSuSE Local Security Checks
critical
44090openSUSE Security Update : krb5 (krb5-1792)NessusSuSE Local Security Checks
critical
44088openSUSE Security Update : krb5 (krb5-1795)NessusSuSE Local Security Checks
critical
44086openSUSE Security Update : krb5 (krb5-1795)NessusSuSE Local Security Checks
critical