Vulnerability & Exploit Database

Back to search

ELSA-2010-0423 Important: Enterprise Linux krb5 security update

Severity CVSS Published Added Modified
7 (AV:N/AC:L/Au:S/C:N/I:N/A:C) April 07, 2010 December 20, 2011 July 04, 2017

Description

The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial

References

Solution

oracle-linux-upgrade-krb5-devel

Related Vulnerabilities