CVE-2010-1321 (CNNVD-201005-249)
中文标题:
MIT Kerberos GSS-API校验和空指针引用拒绝服务漏洞
英文标题:
The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (a...
漏洞描述
中文描述:
Kerberos是美国麻省理工学院(MIT)开发的一套网络认证协议,它采用客户端/服务器结构,并且客户端和服务器端均可对对方进行身份认证(即双重验证),可防止窃听、防止replay攻击等。MIT Kerberos 5(又名krb5)是美国麻省理工学院(MIT)开发的一套网络认证协议,它采用客户端/服务器结构,并且客户端和服务器端均可对对方进行身份认证(即双重验证),可防止窃听、防止replay攻击等。 MIT Kerberos的GSS-API库中存在空指针引用错误,krb5/accept_sec_context.c的kg_accept_krb5函数对无效GSS-API令牌没有适当的检验,远程认证用户可通过认证人checksum字段缺失的AP-REQ消息引发拒绝服务(空指针引用和守护进程崩溃)。
英文描述:
The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| mit | kerberos_5 | * | - | - |
cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 5.0 | - | - |
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 6.0 | - | - |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 6.06 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 8.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 9.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 9.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 10.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
|
| oracle | database_server | - | - | - |
cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.0 | - | - |
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.1 | - | - |
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.2 | - | - |
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.3 | - | - |
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
|
| suse | linux_enterprise_server | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
|
| fedoraproject | fedora | 11 | - | - |
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 12 | - | - |
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 13 | - | - |
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:L/Au:S/C:N/I:N/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2010-1321 |
2025-11-11 15:18:15 | 2025-11-11 07:33:07 |
| NVD | nvd_CVE-2010-1321 |
2025-11-11 14:53:25 | 2025-11-11 07:41:55 |
| CNNVD | cnnvd_CNNVD-201005-249 |
2025-11-11 15:09:05 | 2025-11-11 07:49:43 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-201005-249
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.8
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:S/C:N/I:N/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 18
- references_count: 60 -> 59
- data_sources: ['cve'] -> ['cve', 'nvd']