CVE-2011-1530

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.

References

http://secunia.com/advisories/47124

http://securitytracker.com/id?1026374

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-007.txt

http://www.mandriva.com/security/advisories?name=MDVSA-2011:184

http://www.redhat.com/support/errata/RHSA-2011-1790.html

http://www.securityfocus.com/archive/1/520756/100/0/threaded

http://www.securityfocus.com/bid/50929

https://exchange.xforce.ibmcloud.com/vulnerabilities/71655

Details

Source: MITRE

Published: 2011-12-08

Updated: 2018-10-09

Type: CWE-399

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 8

Severity: MEDIUM

Tenable Plugins

View all (10 total)

IDNameProductFamilySeverity
74531openSUSE Security Update : krb5 (openSUSE-2011-58)NessusSuSE Local Security Checks
medium
69587Amazon Linux AMI : krb5 (ALAS-2011-28)NessusAmazon Linux Local Security Checks
medium
68400Oracle Linux 6 : krb5 (ELSA-2011-1790)NessusOracle Linux Local Security Checks
medium
61939Mandriva Linux Security Advisory : krb5 (MDVSA-2011:184)NessusMandriva Local Security Checks
medium
61190Scientific Linux Security Update : krb5 on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
medium
57655GLSA-201201-13 : MIT Kerberos 5: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
57375CentOS 6 : krb5 (CESA-2011:1790)NessusCentOS Local Security Checks
medium
57293FreeBSD : krb5 -- KDC NULL pointer dereference in TGS handling (6c7d9a35-2608-11e1-89b4-001ec9578670)NessusFreeBSD Local Security Checks
medium
57048Ubuntu 11.10 : krb5 vulnerability (USN-1290-1)NessusUbuntu Local Security Checks
medium
57036RHEL 6 : krb5 (RHSA-2011:1790)NessusRed Hat Local Security Checks
medium