Vulnerability Details : CVE-2013-1416
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2013-1416
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-1416
94.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1416
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2013-1416
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1416
-
https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81
KDC TGS-REQ null deref [CVE-2013-1416] · krb5/krb5@8ee70ec · GitHubPatch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html
openSUSE-SU-2013:0746-1: moderate: krb5Mailing List;Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
mandriva.comThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html
openSUSE-SU-2013:0904-1: moderate: krb5Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html
[SECURITY] Fedora 17 Update: krb5-1.10.2-10.fc17Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html
[SECURITY] Fedora 18 Update: krb5-1.10.3-15.fc18Third Party Advisory
-
http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600
#7600: KDC TGS-REQ null deref [CVE-2013-1416]Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:158
mandriva.comThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html
openSUSE-SU-2013:0967-1: moderate: krb5Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-0748.html
RHSA-2013:0748 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to