5
CVSSv2

CVE-2010-0628

Published: 25/03/2010 Updated: 21/01/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in MIT Kerberos 5 (aka krb5) 1.7 prior to 1.7.2 and 1.8 prior to 1.8.1 allows remote malicious users to cause a denial of service (assertion failure and daemon crash) via an invalid packet that triggers incorrect preparation of an error token.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 1.7.1

mit kerberos 5 1.8

mit kerberos 5 1.7

Vendor Advisories

Emmanuel Bouillon discovered that Kerberos did not correctly handle certain message types An unauthenticated remote attacker could send specially crafted traffic to cause the KDC to crash, leading to a denial of service (CVE-2010-0283) ...
Debian Bug report logs - #575740 CVE-2010-0628 (MITKRB5-SA-2010-002) Package: krb5; Maintainer for krb5 is Sam Hartman <hartmans@debianorg>; Reported by: Giuseppe Iuculano <iuculano@debianorg> Date: Sun, 28 Mar 2010 21:03:01 UTC Severity: grave Tags: patch, security Found in version 18+dfsg~alpha1-7 Fixed in vers ...