6.8
CVSSv2

CVE-2011-1530

Published: 08/12/2011 Updated: 09/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
VMScore: 605
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Summary

The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 up to and including 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.

Vulnerable Product Search on Vulmon Subscribe to Product

mit mit kerberos 5.1.9.2

mit mit kerberos 5.1.9

mit mit kerberos 5.1.9.1

Vendor Advisories

Synopsis Moderate: krb5 security update Type/Severity Security Advisory: Moderate Topic Updated krb5 packages that fix one security issue are now available forRed Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerability Scoring ...
The Kerberos Key Distribution Center (KDC) could be made to crash ...
A NULL pointer dereference flaw was found in the way the MIT Kerberos KDC processed certain TGS (Ticket-granting Server) requests A remote, authenticated attacker could use this flaw to crash the KDC via a specially-crafted TGS request (CVE-2011-1530) ...