Vulnerability Details : CVE-2010-1321
The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
Vulnerability category: Memory CorruptionDenial of service
Threat overview for CVE-2010-1321
Top countries where our scanners detected CVE-2010-1321
Top open port discovered on systems with this issue
8200
IPs affected by CVE-2010-1321 2,339
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-1321!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-1321
Probability of exploitation activity in the next 30 days: 0.49%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-1321
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:C |
8.0
|
6.9
|
NIST |
CWE ids for CVE-2010-1321
-
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-1321
-
http://www.redhat.com/support/errata/RHSA-2010-0987.html
SupportThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:013Mailing List;Third Party Advisory
-
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
Patch;Vendor Advisory
-
http://www.ubuntu.com/usn/USN-940-1
USN-940-1: Kerberos vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0770.html
SupportThird Party Advisory
-
http://www.vupen.com/english/advisories/2010/1177
Webmail | OVH- OVHThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2011-0152.html
SupportThird Party Advisory
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
Broken Link
-
http://www.vupen.com/english/advisories/2010/1574
Webmail | OVH- OVHThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0807.html
SupportThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
Oracle Critical Patch Update - October 2010Third Party Advisory
-
http://www.us-cert.gov/cas/techalerts/TA10-287A.html
Oracle Updates for Multiple Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://www.us-cert.gov/cas/techalerts/TA11-201A.html
Oracle Updates for Multiple Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
[security-announce] SUSE-SU-2012:0010-1: important: Security update forMailing List;Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450
Repository / Oval RepositoryBroken Link;Third Party Advisory
-
http://www.vupen.com/english/advisories/2010/3112
Webmail | OVH- OVHThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:019Mailing List;Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2011-0880.html
SupportThird Party Advisory
-
http://www.debian.org/security/2010/dsa-2052
Debian -- Security Information -- DSA-2052-1 krb5Third Party Advisory
-
http://www.vupen.com/english/advisories/2011/0134
Webmail | OVH- OVHThird Party Advisory
-
http://www.vupen.com/english/advisories/2010/1196
Webmail | OVH- OVHThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0423.html
SupportThird Party Advisory
-
http://support.avaya.com/css/P8/documents/100114315
ASA-2010-307 (RHSA-2010-0770)Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198
Repository / Oval RepositoryBroken Link;Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:100
mandriva.comThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0873.html
SupportThird Party Advisory
-
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
VMSA-2011-0003.2Third Party Advisory
-
http://www.securityfocus.com/archive/1/511331/100/0/threaded
SecurityFocusThird Party Advisory;VDB Entry
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html
[SECURITY] Fedora 12 Update: krb5-1.7.1-9.fc12Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html
[SECURITY] Fedora 11 Update: krb5-1.6.3-31.fc11Third Party Advisory
-
http://www.vupen.com/english/advisories/2010/1222
Webmail | OVH- OVHThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0935.html
SupportThird Party Advisory
-
http://www.ubuntu.com/usn/USN-940-2
USN-940-2: Kerberos vulnerability | Ubuntu security noticesThird Party Advisory
-
http://www.securityfocus.com/bid/40235
MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:014Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
[security-announce] SUSE-SU-2012:0042-1: important: Security update forMailing List;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=134254866602253&w=2
'[security bulletin] HPSBMU02799 SSRT100867 rev.1 - HP Network Node Manager i (NNMi) v9.0x Running JD' - MARCIssue Tracking;Third Party Advisory
-
http://www.securityfocus.com/archive/1/516397/100/0/threaded
SecurityFocusThird Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604
Repository / Oval RepositoryBroken Link;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html
[SECURITY] Fedora 13 Update: krb5-1.7.1-10.fc13Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
Oracle Critical Patch Update - January 2011Third Party Advisory
-
http://www.vupen.com/english/advisories/2010/1882
Webmail | OVH- OVHThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html
Oracle Critical Patch Update - July 2011Third Party Advisory
-
http://www.vupen.com/english/advisories/2010/1192
Webmail | OVH- OVHThird Party Advisory
-
http://www.vupen.com/english/advisories/2010/1193
Webmail | OVH- OVHThird Party Advisory
Products affected by CVE-2010-1321
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
- cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*