4
CVSSv2

CVE-2010-1320

Published: 22/04/2010 Updated: 21/01/2020
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
VMScore: 405
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x prior to 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated with (1) renewal or (2) validation.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 1.8

mit kerberos 5 1.8.1

mit kerberos 5 1.7

mit kerberos 5 1.7.1

Vendor Advisories

Debian Bug report logs - #577490 CVE-2010-1320 double free in KDC caused by ticket renewal Package: krb5-kdc; Maintainer for krb5-kdc is Sam Hartman <hartmans@debianorg>; Source for krb5-kdc is src:krb5 (PTS, buildd, popcon) Reported by: Joel Johnson <mrjoel@lixilnet> Date: Mon, 12 Apr 2010 05:39:01 UTC Severity: ...
Unauthenticated remote attackers could cause Kerberos servers to crash, leading to a denial of service ...
An attacker could send crafted input to kadmind and cause it to crash ...

Exploits

source: wwwsecurityfocuscom/bid/39599/info MIT Kerberos is prone to a remote memory-corruption vulnerability An authenticated attacker can exploit this issue by sending specially crafted ticket-renewal requests to a vulnerable computer Successfully exploiting this issue can allow the attacker to execute arbitrary code with superuser p ...