CVE-2011-0284

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.

References

http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html

http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html

http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html

http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html

http://osvdb.org/71183

http://secunia.com/advisories/43700

http://secunia.com/advisories/43760

http://secunia.com/advisories/43783

http://secunia.com/advisories/43881

http://securitytracker.com/id?1025216

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt

http://www.kb.cert.org/vuls/id/943220

http://www.mandriva.com/security/advisories?name=MDVSA-2011:048

http://www.redhat.com/support/errata/RHSA-2011-0356.html

http://www.securityfocus.com/archive/1/517029/100/0/threaded

http://www.securityfocus.com/bid/46881

http://www.ubuntu.com/usn/USN-1088-1

http://www.vupen.com/english/advisories/2011/0672

http://www.vupen.com/english/advisories/2011/0673

http://www.vupen.com/english/advisories/2011/0680

http://www.vupen.com/english/advisories/2011/0722

http://www.vupen.com/english/advisories/2011/0763

https://exchange.xforce.ibmcloud.com/vulnerabilities/66101

Details

Source: MITRE

Published: 2011-03-20

Updated: 2020-01-21

Type: CWE-399

Risk Information

CVSS v2

Base Score: 7.6

Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 4.9

Severity: HIGH

Tenable Plugins

View all (13 total)

IDNameProductFamilySeverity
80653Oracle Solaris Third-Party Patch Update : kerberos (cve_2010_1322_improper_input)NessusSolaris Local Security Checks
medium
75883openSUSE Security Update : krb5 (krb5-4163)NessusSuSE Local Security Checks
high
75561openSUSE Security Update : krb5 (krb5-4163)NessusSuSE Local Security Checks
high
68230Oracle Linux 6 : krb5 (ELSA-2011-0356)NessusOracle Linux Local Security Checks
high
57655GLSA-201201-13 : MIT Kerberos 5: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
53744openSUSE Security Update : krb5 (krb5-4163)NessusSuSE Local Security Checks
high
53443FreeBSD : krb5 -- MITKRB5-SA-2011-003, KDC vulnerable to double-free when PKINIT enabled (7edac52a-66cd-11e0-9398-5d45f3aa24f0)NessusFreeBSD Local Security Checks
high
52965Fedora 13 : krb5-1.7.1-18.fc13 (2011-3464)NessusFedora Local Security Checks
high
52964Fedora 14 : krb5-1.8.2-9.fc14 (2011-3462)NessusFedora Local Security Checks
high
52746Fedora 15 : krb5-1.9-6.fc15 (2011-3547)NessusFedora Local Security Checks
high
52730Mandriva Linux Security Advisory : krb5 (MDVSA-2011:048)NessusMandriva Local Security Checks
high
52700RHEL 6 : krb5 (RHSA-2011:0356)NessusRed Hat Local Security Checks
high
52682Ubuntu 9.10 / 10.04 LTS / 10.10 : krb5 vulnerability (USN-1088-1)NessusUbuntu Local Security Checks
high