CVE-2012-1013
Published Jun 7, 2012
Last updated 5 years ago
Overview
- Description
- The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36823B2B-5C72-4FF3-9301-FB263EB8CE09" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59AFA33E-FEBC-45F5-9EC6-8AA363163FB5" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04D83332-B2FD-4E86-A76C-C3F1CD3B3A31" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "758A0011-20ED-414A-9DF3-50A161DF8BC2" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7768AED0-AE4C-4D4E-8D5D-5B618AB82966" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "534104C5-966E-4740-A354-4F6C210FF25B" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78AF5659-C0E3-49C4-9CA7-FC3917C8AC49" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86738633-C081-4440-9F75-A775D6DF2228" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7BCFFEE-EA7A-4F26-97AA-31128A179745" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91A2D7F5-EBDE-4000-AC78-8DD6472E685A" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E92BFA5-723E-4843-A8D8-BC1D32F34569" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC504264-A9E9-4433-B7AA-6D5015A93FF3" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77FA352F-520C-4C05-AD52-FC8586DB16B1" } ], "operator": "OR" } ] } ]