CVE-2012-1014

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.

References

http://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt

http://www.debian.org/security/2012/dsa-2518

Details

Source: MITRE

Published: 2012-08-06

Updated: 2020-01-21

Risk Information

CVSS v2

Base Score: 9

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C

Impact Score: 8.5

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
74706openSUSE Security Update : krb5 (openSUSE-SU-2012:0967-1)NessusSuSE Local Security Checks
high
71487GLSA-201312-12 : MIT Kerberos 5: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
61425Fedora 17 : krb5-1.10.2-6.fc17 (2012-11388)NessusFedora Local Security Checks
high
61379Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : krb5 vulnerabilities (USN-1520-1)NessusUbuntu Local Security Checks
high
61374Debian DSA-2518-1 : krb5 - denial of service and remote code executionNessusDebian Local Security Checks
high