Vulnerability Details : CVE-2011-1530
The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-1530
Probability of exploitation activity in the next 30 days: 1.32%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 84 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1530
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:C |
8.0
|
6.9
|
NIST |
CWE ids for CVE-2011-1530
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1530
-
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-007.txt
Patch
-
http://www.redhat.com/support/errata/RHSA-2011-1790.html
Support
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/71655
MIT Kerberos process_tgs_req() denial of service CVE-2011-1530 Vulnerability Report
-
http://www.securityfocus.com/archive/1/520756/100/0/threaded
SecurityFocus
-
http://www.securityfocus.com/bid/50929
MIT Kerberos KDC TGS Handling NULL Pointer Dereference Denial Of Service Vulnerability
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:184
mandriva.com
-
http://securitytracker.com/id?1026374
Kerberos Null Pointer Dereference in process_tgs_req() Lets Remote Authenticated Users Deny Service - SecurityTracker
Products affected by CVE-2011-1530
- cpe:2.3:a:mit:mit_kerberos:5.1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:mit_kerberos:5.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:mit:mit_kerberos:5.1.9.1:*:*:*:*:*:*:*