Executive Summary

Informations
NameCVE-2010-0629First vendor Publication2010-04-07
VendorCveLast vendor Modification2010-08-21

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:N/I:N/A:P)
Cvss Base Score4Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629

CWE : Common Weakness Enumeration

idName
CWE-399Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:9489
 
Oval ID: oval:org.mitre.oval:def:9489
Title: Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Description: Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: vulnerability
Reference(s): CVE-2010-0629
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6724
 
Oval ID: oval:org.mitre.oval:def:6724
Title: DSA-2031 krb5 -- use-after-free
Description: Sol Jerome discovered that kadmind service in krb5, a system for authenticating users and services on a network, allows remote authenticated users to cause a denial of service via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: patch
Reference(s): DSA-2031
CVE-2010-0629
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22037
 
Oval ID: oval:org.mitre.oval:def:22037
Title: RHSA-2010:0343: krb5 security and bug fix update (Important)
Description: Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: patch
Reference(s): RHSA-2010:0343-01
CESA-2010:0343
CVE-2010-0629
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20259
 
Oval ID: oval:org.mitre.oval:def:20259
Title: DSA-2031-1 krb5 - denial of service
Description: Sol Jerome discovered that kadmind service in krb5, a system for authenticating users and services on a network, allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: patch
Reference(s): DSA-2031-1
CVE-2010-0629
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23005
 
Oval ID: oval:org.mitre.oval:def:23005
Title: ELSA-2010:0343: krb5 security and bug fix update (Important)
Description: Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: patch
Reference(s): ELSA-2010:0343-01
CVE-2010-0629
Version: 6
Platform(s): Oracle Linux 5
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28012
 
Oval ID: oval:org.mitre.oval:def:28012
Title: ELSA-2010-0343 -- krb5 security and bug fix update (important)
Description: [1.6.1-36.el5_5.3] - add upstream patch to fix a few use-after-free bugs, including one in kadmind (CVE-2010-0629, #578185) [1.6.1-36.el5_5.2] - pull changes to libkrb5 to properly handle and chase off-path referrals back from 1.7 (#574387)
Family: unix Class: patch
Reference(s): ELSA-2010-0343
CVE-2010-0629
Version: 3
Platform(s): Oracle Linux 5
Product(s): krb5
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application8

OpenVAS Exploits

DateDescription
2012-02-12Name : Gentoo Security Advisory GLSA 201201-13 (mit-krb5)
File : nvt/glsa_201201_13.nasl
2011-08-09Name : CentOS Update for krb5-devel CESA-2010:0343 centos5 i386
File : nvt/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl
2010-05-28Name : Fedora Update for krb5 FEDORA-2010-8796
File : nvt/gb_fedora_2010_8796_krb5_fc11.nasl
2010-04-21Name : FreeBSD Ports: krb5
File : nvt/freebsd_krb52.nasl
2010-04-16Name : Mandriva Update for krb5 MDVSA-2010:071 (krb5)
File : nvt/gb_mandriva_MDVSA_2010_071.nasl
2010-04-09Name : Fedora Update for krb5 FEDORA-2010-6108
File : nvt/gb_fedora_2010_6108_krb5_fc11.nasl
2010-04-09Name : Ubuntu Update for krb5 vulnerabilities USN-924-1
File : nvt/gb_ubuntu_USN_924_1.nasl
2010-04-09Name : RedHat Update for krb5 RHSA-2010:0343-01
File : nvt/gb_RHSA-2010_0343-01_krb5.nasl
2010-02-19Name : Mandriva Update for eject MDVA-2010:071 (eject)
File : nvt/gb_mandriva_MDVA_2010_071.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
63569Kerberos src/kadmin/server/server_stubs.c init_2_svc() Function API Version N...

Nessus® Vulnerability Scanner

DateDescription
2014-11-26Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2011-0015.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0343.nasl - Type : ACT_GATHER_INFO
2013-03-09Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-924-1.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20100406_krb5_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-01-24Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201201-13.nasl - Type : ACT_GATHER_INFO
2010-12-02Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_krb5-100401.nasl - Type : ACT_GATHER_INFO
2010-07-01Name : The remote Fedora host is missing a security update.
File : fedora_2010-6108.nasl - Type : ACT_GATHER_INFO
2010-06-01Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0343.nasl - Type : ACT_GATHER_INFO
2010-05-11Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0343.nasl - Type : ACT_GATHER_INFO
2010-04-20Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_a30573dc489311dfa5f9001641aeabdf.nasl - Type : ACT_GATHER_INFO
2010-04-14Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-071.nasl - Type : ACT_GATHER_INFO
2010-04-13Name : The remote openSUSE host is missing a security update.
File : suse_11_1_krb5-100401.nasl - Type : ACT_GATHER_INFO
2010-04-13Name : The remote openSUSE host is missing a security update.
File : suse_11_0_krb5-100401.nasl - Type : ACT_GATHER_INFO
2010-04-12Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2031.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BIDhttp://www.securityfocus.com/bid/39247
BUGTRAQhttp://www.securityfocus.com/archive/1/archive/1/510566/100/0/threaded
CONFIRMhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567052
http://krbdev.mit.edu/rt/Ticket/Display.html?id=5998
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-003.txt
DEBIANhttp://www.debian.org/security/2010/dsa-2031
FEDORAhttp://lists.fedoraproject.org/pipermail/package-announce/2010-April/038556.html
MANDRIVAhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:071
REDHAThttp://www.redhat.com/support/errata/RHSA-2010-0343.html
SECTRACKhttp://securitytracker.com/id?1023821
SECUNIAhttp://secunia.com/advisories/39264
http://secunia.com/advisories/39290
http://secunia.com/advisories/39315
http://secunia.com/advisories/39324
http://secunia.com/advisories/39367
SUSEhttp://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
UBUNTUhttp://ubuntu.com/usn/usn-924-1
VUPENhttp://www.vupen.com/english/advisories/2010/0876

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2014-11-27 13:27:41
  • Multiple Updates
2014-02-17 10:53:58
  • Multiple Updates
2013-05-10 23:18:47
  • Multiple Updates