CVE-2003-0072
Published Apr 2, 2003
Last updated 5 years ago
Overview
- Description
- The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes an out-of-bounds read of an array (aka "array overrun").
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mit:kerberos:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACC18A69-28AC-4DED-AA9D-B050709A9D43" }, { "criteria": "cpe:2.3:a:mit:kerberos:1.2.2.beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D65D5B46-F8BD-41C4-86F2-D495F1EB4F47" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8973E93-0BBE-4BD3-9983-F6480FFEA228" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A37987D-22F9-47AC-A07A-380F7E509BFE" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE8C0C82-749E-4837-88F8-FB56A753B094" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AD672FA-918D-48CB-BC03-4E412AF0DCCC" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0B363A4-BB7A-48A2-AE6B-BD2DDD46E7CB" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74EF42A5-EC47-4475-81D6-FD1E9C2B8A3C" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30F2CBEF-6FA1-4E07-8163-6AFEDC93FCE5" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D133CB0D-8A54-4DAA-9FE8-0B367544DE65" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B2C23BD-1995-4F09-B444-87DDDE21817E" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEF118BE-6351-4768-A3F0-DFE0065273D9" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B1422F8-CC87-46EA-8649-A12D6E47335D" } ], "operator": "OR" } ] } ]