4
CVSSv2

CVE-2012-1013

Published: 07/06/2012 Updated: 21/01/2020
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x prior to 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 1.8.5

mit kerberos 5 1.8.6

mit kerberos 5 1.8

mit kerberos 5 1.8.1

mit kerberos 5 1.8.2

mit kerberos 5 1.8.3

mit kerberos 5 1.8.4

mit kerberos 5 1.9

mit kerberos 5 1.9.1

mit kerberos 5 1.9.2

mit kerberos 5 1.9.3

mit kerberos 5 1.10

mit kerberos 5 1.10.1

Vendor Advisories

Synopsis Important: krb5 security update Type/Severity Security Advisory: Important Topic Updated krb5 packages that fix two security issues are now available forRed Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerability Scori ...
Debian Bug report logs - #687647 CVE-2012-1013 Package: krb5; Maintainer for krb5 is Sam Hartman <hartmans@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 14 Sep 2012 15:27:01 UTC Severity: serious Tags: security Fixed in version krb5/1101+dfsg-3 Done: Sam Hartman <hartmans@debianorg& ...
Several security issues were fixed in Kerberos ...
An uninitialized pointer use flaw was found in the way the MIT Kerberos KDC handled initial authentication requests (AS-REQ) A remote, unauthenticated attacker could use this flaw to crash the KDC via a specially-crafted AS-REQ request (CVE-2012-1015) A NULL pointer dereference flaw was found in the MIT Kerberos administration daemon, kadmind A ...