Description
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2129-1 | New krb5 packages fix checksum verification weakness |
EUVD |
EUVD-2010-1352 | MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. |
Ubuntu USN |
USN-1030-1 | Kerberos vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T01:21:18.474Z
Reserved: 2010-04-08T00:00:00.000Z
Link: CVE-2010-1323
No data.
Status : Deferred
Published: 2010-12-02T16:22:20.847
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-1323
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN