First published: Thu Oct 07 2010(Updated: )
The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application | =1.8 | |
MIT Kerberos 5 Application | =1.8.1 | |
MIT Kerberos 5 Application | =1.8.2 | |
MIT Kerberos 5 Application | =1.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1322 is classified as a medium-severity vulnerability due to its potential to cause denial of service.
To fix CVE-2010-1322, you should upgrade to MIT Kerberos 5 version 1.8.4 or later.
CVE-2010-1322 affects MIT Kerberos 5 versions 1.8 through 1.8.3.
CVE-2010-1322 is a denial of service vulnerability that allows attackers to crash the KDC daemon.
While CVE-2010-1322 primarily causes denial of service, it could potentially be exploited to access sensitive information.