Vulnerability Details : CVE-2012-1015
The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x before 1.9.5, and 1.10.x before 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free, heap memory corruption, and daemon crash) via a crafted AS-REQ request.
Vulnerability category: Memory CorruptionInput validationExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2012-1015
Probability of exploitation activity in the next 30 days: 13.36%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-1015
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-1015
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-1015
-
http://www.mandriva.com/security/advisories?name=MDVSA-2012:120
mandriva.com
-
http://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html
openSUSE-SU-2012:0967-1: moderate: krb5: fixed several potential code ex
-
http://rhn.redhat.com/errata/RHSA-2012-1131.html
RHSA-2012:1131 - Security Advisory - Red Hat Customer Portal
-
http://www.debian.org/security/2012/dsa-2518
Debian -- Security Information -- DSA-2518-1 krb5
-
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt
Patch;Vendor Advisory
Products affected by CVE-2012-1015
- cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*