Executive Summary

Informations
Name CVE-2010-0629 First vendor Publication 2010-04-07
Vendor Cve Last vendor Modification 2024-02-02

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 6.5
Base Score 6.5 Environmental Score 6.5
impact SubScore 3.6 Temporal Score 6.5
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:N/I:N/A:P)
Cvss Base Score 4 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0629

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20259
 
Oval ID: oval:org.mitre.oval:def:20259
Title: DSA-2031-1 krb5 - denial of service
Description: Sol Jerome discovered that kadmind service in krb5, a system for authenticating users and services on a network, allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: patch
Reference(s): DSA-2031-1
CVE-2010-0629
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22037
 
Oval ID: oval:org.mitre.oval:def:22037
Title: RHSA-2010:0343: krb5 security and bug fix update (Important)
Description: Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: patch
Reference(s): RHSA-2010:0343-01
CESA-2010:0343
CVE-2010-0629
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23005
 
Oval ID: oval:org.mitre.oval:def:23005
Title: ELSA-2010:0343: krb5 security and bug fix update (Important)
Description: Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: patch
Reference(s): ELSA-2010:0343-01
CVE-2010-0629
Version: 6
Platform(s): Oracle Linux 5
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28012
 
Oval ID: oval:org.mitre.oval:def:28012
Title: DEPRECATED: ELSA-2010-0343 -- krb5 security and bug fix update (important)
Description: [1.6.1-36.el5_5.3] - add upstream patch to fix a few use-after-free bugs, including one in kadmind (CVE-2010-0629, #578185) [1.6.1-36.el5_5.2] - pull changes to libkrb5 to properly handle and chase off-path referrals back from 1.7 (#574387)
Family: unix Class: patch
Reference(s): ELSA-2010-0343
CVE-2010-0629
Version: 4
Platform(s): Oracle Linux 5
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6724
 
Oval ID: oval:org.mitre.oval:def:6724
Title: DSA-2031 krb5 -- use-after-free
Description: Sol Jerome discovered that kadmind service in krb5, a system for authenticating users and services on a network, allows remote authenticated users to cause a denial of service via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: patch
Reference(s): DSA-2031
CVE-2010-0629
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9489
 
Oval ID: oval:org.mitre.oval:def:9489
Title: Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Description: Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.
Family: unix Class: vulnerability
Reference(s): CVE-2010-0629
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 39
Os 3
Os 1
Os 2
Os 1

OpenVAS Exploits

Date Description
2012-02-12 Name : Gentoo Security Advisory GLSA 201201-13 (mit-krb5)
File : nvt/glsa_201201_13.nasl
2011-08-09 Name : CentOS Update for krb5-devel CESA-2010:0343 centos5 i386
File : nvt/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl
2010-05-28 Name : Fedora Update for krb5 FEDORA-2010-8796
File : nvt/gb_fedora_2010_8796_krb5_fc11.nasl
2010-04-21 Name : FreeBSD Ports: krb5
File : nvt/freebsd_krb52.nasl
2010-04-16 Name : Mandriva Update for krb5 MDVSA-2010:071 (krb5)
File : nvt/gb_mandriva_MDVSA_2010_071.nasl
2010-04-09 Name : RedHat Update for krb5 RHSA-2010:0343-01
File : nvt/gb_RHSA-2010_0343-01_krb5.nasl
2010-04-09 Name : Fedora Update for krb5 FEDORA-2010-6108
File : nvt/gb_fedora_2010_6108_krb5_fc11.nasl
2010-04-09 Name : Ubuntu Update for krb5 vulnerabilities USN-924-1
File : nvt/gb_ubuntu_USN_924_1.nasl
2010-02-19 Name : Mandriva Update for eject MDVA-2010:071 (eject)
File : nvt/gb_mandriva_MDVA_2010_071.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
63569 Kerberos src/kadmin/server/server_stubs.c init_2_svc() Function API Version N...

Nessus® Vulnerability Scanner

Date Description
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2011-0015.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0343.nasl - Type : ACT_GATHER_INFO
2013-03-09 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-924-1.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20100406_krb5_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-01-24 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201201-13.nasl - Type : ACT_GATHER_INFO
2010-12-02 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_krb5-100401.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-6108.nasl - Type : ACT_GATHER_INFO
2010-06-01 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0343.nasl - Type : ACT_GATHER_INFO
2010-05-11 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0343.nasl - Type : ACT_GATHER_INFO
2010-04-20 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_a30573dc489311dfa5f9001641aeabdf.nasl - Type : ACT_GATHER_INFO
2010-04-14 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-071.nasl - Type : ACT_GATHER_INFO
2010-04-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_krb5-100401.nasl - Type : ACT_GATHER_INFO
2010-04-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_krb5-100401.nasl - Type : ACT_GATHER_INFO
2010-04-12 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2031.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/39247
BUGTRAQ http://www.securityfocus.com/archive/1/510566/100/0/threaded
CONFIRM http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567052
http://krbdev.mit.edu/rt/Ticket/Display.html?id=5998
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-003.txt
DEBIAN http://www.debian.org/security/2010/dsa-2031
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038556.html
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2010:071
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://www.redhat.com/support/errata/RHSA-2010-0343.html
SECTRACK http://securitytracker.com/id?1023821
SECUNIA http://secunia.com/advisories/39264
http://secunia.com/advisories/39290
http://secunia.com/advisories/39315
http://secunia.com/advisories/39324
http://secunia.com/advisories/39367
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html
UBUNTU http://ubuntu.com/usn/usn-924-1
VUPEN http://www.vupen.com/english/advisories/2010/0876

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-02-02 21:28:24
  • Multiple Updates
2021-05-04 12:11:08
  • Multiple Updates
2021-04-22 01:11:43
  • Multiple Updates
2020-05-23 00:25:18
  • Multiple Updates
2018-10-11 00:19:47
  • Multiple Updates
2017-09-19 09:23:39
  • Multiple Updates
2016-04-26 19:35:37
  • Multiple Updates
2014-11-27 13:27:41
  • Multiple Updates
2014-02-17 10:53:58
  • Multiple Updates
2013-05-10 23:18:47
  • Multiple Updates