CVE-2009-3295
 
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.
La función prep_reprocess_req de kdc/do_tgs_req.c en la implementación de "cross-realm referral" (referencia entre dominios cruzados) en el Key Distribution Center (KDC) de MIT Kerberos 5 (krb5) v1.7 anteriores a v1.7.1 permite a atacantes remotos provocar una denegación de servicio (dereferenciación de un puntero NULL y caída del servicio) a través de una petición de ticket.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2009-09-22 CVE Reserved
- 2009-12-29 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1023392 | Vdb Entry | |
http://www.securityfocus.com/archive/1/508622/100/0/threaded | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-003.txt | 2020-01-21 | |
http://www.securityfocus.com/bid/37486 | 2020-01-21 | |
http://www.vupen.com/english/advisories/2009/3652 | 2020-01-21 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/37977 | 2020-01-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.7 Search vendor "Mit" for product "Kerberos 5" and version "1.7" | - |
Affected
|