Description
The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.
Published: 2010-10-07
Score: 6.5 Medium
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2010-1351 The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.
Ubuntu USN Ubuntu USN USN-999-1 Kerberos vulnerability
History

No history.

Subscriptions

Mit Kerberos 5
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T01:21:18.558Z

Reserved: 2010-04-08T00:00:00.000Z

Link: CVE-2010-1322

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-10-07T21:00:01.407

Modified: 2026-04-29T01:13:23.040

Link: CVE-2010-1322

cve-icon Redhat

Severity : Important

Publid Date: 2010-10-05T00:00:00Z

Links: CVE-2010-1322 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses