Vulnerability Details : CVE-2010-0433
The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
Vulnerability category: Memory CorruptionInput validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-0433
Probability of exploitation activity in the next 30 days: 8.02%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-0433
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2010-0433
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0433
-
http://www.vupen.com/english/advisories/2010/0916
Webmail | OVH- OVH
-
http://www.mail-archive.com/dovecot%40dovecot.org/msg26224.html
[Dovecot] segfault - (imap|pop3)-login during nessus scan
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856
Repository / Oval Repository
-
http://cvs.openssl.org/chngview?cn=19374
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
[SECURITY] Fedora 13 Update: openssl-1.0.0-1.fc13
-
http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7
stunnel crashes with weak certificates... could it be OpenSSL? - Google Groepen
-
http://marc.info/?l=bugtraq&m=127557640302499&w=2
'[security bulletin] HPSBUX02531 SSRT100108 rev.1 - HP-UX Running Apache-based Web Server, Remote Den' - MARC
- https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718
Repository / Oval Repository
-
http://www.vupen.com/english/advisories/2010/0839
Webmail | OVH- OVH
- https://kb.bluecoat.com/index?page=content&id=SA50
-
https://bugzilla.redhat.com/show_bug.cgi?id=567711
567711 – Nessus PCI scan segfaults openssl dependent products due to kerberos enabled in openssl
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
mandriva.com
- https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
-
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
VMSA-2011-0003.2
-
http://www.vupen.com/english/advisories/2010/1216
Webmail | OVH- OVH
-
http://marc.info/?l=bugtraq&m=127128920008563&w=2
'[security bulletin] HPSBUX02517 SSRT100058 rev.1 - HP-UX Running OpenSSL, Remote Unauthorized Inform' - MARC
-
http://www.openssl.org/news/changelog.html
/news/changelog.html
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
[SECURITY] Fedora 11 Update: openssl-0.9.8n-1.fc11
-
https://bugzilla.redhat.com/show_bug.cgi?id=569774
569774 – (CVE-2010-0433) CVE-2010-0433 openssl: crash caused by a missing krb5_sname_to_principal() return value check
-
http://www.vupen.com/english/advisories/2010/0933
Webmail | OVH- OVH
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260
Repository / Oval Repository
-
http://www.openwall.com/lists/oss-security/2010/03/03/5
oss-security - OpenSSL (with KRB5) remote crash - CVE-2010-0433
-
http://www.securityfocus.com/archive/1/516397/100/0/threaded
SecurityFocus
-
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
VMware vCenter Server 4.1 Update 1 Release Notes
Products affected by CVE-2010-0433
- cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*