1.3 KiB
1.3 KiB
CVE-2010-1321
Description
The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
POC
Reference
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt
- http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
- http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
- http://www.redhat.com/support/errata/RHSA-2011-0880.html
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
Github
No PoCs found on GitHub currently.