The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
                
            References
                    Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Configuration 2 (hide)
                                
                                
  | 
                        
Configuration 3 (hide)
                                
                                
  | 
                        
Configuration 4 (hide)
                                
                                
  | 
                        
Configuration 5 (hide)
                                
                                
  | 
                        
Configuration 6 (hide)
                                
                                
  | 
                        
Information
                Published : 2010-05-19 11:30
Updated : 2021-02-02 10:53
NVD link : CVE-2010-1321
Mitre link : CVE-2010-1321
JSON object : View
CWE
                
                    
                        
                        CWE-476
                        
            NULL Pointer Dereference
Products Affected
                fedoraproject
- fedora
 
canonical
- ubuntu_linux
 
oracle
- database_server
 
debian
- debian_linux
 
suse
- linux_enterprise_server
 
opensuse
- opensuse
 
mit
- kerberos_5
 


