Vulnerability & Exploit Database

Back to search

RHSA-2010:0423: krb5 security update

Severity CVSS Published Added Modified
7 (AV:N/AC:L/Au:S/C:N/I:N/A:C) May 19, 2010 May 28, 2010 July 04, 2017

Description

Kerberos is a network authentication system which allows clients andservers to authenticate to each other using symmetric encryption and atrusted third party, the Key Distribution Center (KDC).A NULL pointer dereference flaw was discovered in the MIT Kerberos GenericSecurity Service Application Program Interface (GSS-API) library. A remote,authenticated attacker could use this flaw to crash any server applicationusing the GSS-API authentication mechanism, by sending a specially-craftedGSS-API token with a missing checksum field. (CVE-2010-1321)Red Hat would like to thank the MIT Kerberos Team for responsibly reportingthis issue. Upstream acknowledges Shawn Emery of Oracle as the originalreporter.All krb5 users should upgrade to these updated packages, which contain abackported patch to correct this issue. All running services using the MITKerberos libraries must be restarted for the update to take effect.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial

References

Solution

redhat-upgrade-krb5-devel

Related Vulnerabilities