CVE-2010-1320
MIT Kerberos 5 - 'src/kdc/do_tgs_req.c' Ticket Renewal Double-Free Memory Corruption
Severity Score
4.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x before 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated with (1) renewal or (2) validation.
Una doble vulnerabilidad en do_tgs_req.c en el Centro de distribución de claves (KDC) en MIT Kerberos 5 (también conocido como krb5) versiones v1.7.x y v1.8.x antes de v1.8.2 permite a los usuarios remotos autenticados causar una denegación de servicio (con caída del demonio) o posiblemente ejecutar código arbitrario mediante una petición asociada con una (1) renovación o (2) validación.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2010-04-08 CVE Reserved
- 2010-04-20 CVE Published
- 2010-04-20 First Exploit
- 2024-06-09 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-399: Resource Management Errors
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577490 | X_refsource_confirm | |
http://secunia.com/advisories/39656 | Third Party Advisory | |
http://secunia.com/advisories/39784 | Third Party Advisory | |
http://secunia.com/advisories/40220 | Third Party Advisory | |
http://securitytracker.com/id?1023904 | Vdb Entry | |
http://support.apple.com/kb/HT4188 | X_refsource_confirm | |
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-004.txt | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/510843/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2010/1001 | Vdb Entry | |
http://www.vupen.com/english/advisories/2010/1192 | Vdb Entry | |
http://www.vupen.com/english/advisories/2010/1481 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/33855 | 2010-04-20 | |
http://www.securityfocus.com/bid/39599 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html | 2020-01-21 | |
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html | 2020-01-21 | |
http://www.ubuntu.com/usn/USN-940-1 | 2020-01-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.7 Search vendor "Mit" for product "Kerberos 5" and version "1.7" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.7.1 Search vendor "Mit" for product "Kerberos 5" and version "1.7.1" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.8 Search vendor "Mit" for product "Kerberos 5" and version "1.8" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.8.1 Search vendor "Mit" for product "Kerberos 5" and version "1.8.1" | - |
Affected
|