First published: Thu Dec 02 2010(Updated: )
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | =1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4021 has a moderate severity level as it allows remote authenticated users to potentially impersonate clients.
To fix CVE-2010-4021, upgrade to a patched version of MIT Kerberos 5 that resolves the TGT credential restriction issue.
CVE-2010-4021 affects all users of MIT Kerberos 5 version 1.7.
CVE-2010-4021 facilitates impersonation attacks where an attacker can rewrite an inner request to act as a legitimate client.
No, CVE-2010-4021 is only exploitable by remote authenticated users with access to the vulnerable MIT Kerberos 5 service.