CVE-2012-1012

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

server/server_stubs.c in the kadmin protocol implementation in MIT Kerberos 5 (aka krb5) 1.10 before 1.10.1 does not properly restrict access to (1) SET_STRING and (2) GET_STRINGS operations, which might allow remote authenticated administrators to modify or read string attributes by leveraging the global list privilege.

References

http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7093

http://src.mit.edu/fisheye/changelog/krb5/?cs=25704

http://web.mit.edu/kerberos/krb5-1.10/

https://bugzilla.redhat.com/show_bug.cgi?id=796438

Details

Source: MITRE

Published: 2012-06-07

Updated: 2020-01-21

Type: CWE-264

Risk Information

CVSS v2

Base Score: 5.5

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 8

Severity: MEDIUM

Tenable Plugins

View all (1 total)

IDNameProductFamilySeverity
61379Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : krb5 vulnerabilities (USN-1520-1)NessusUbuntu Local Security Checks
high