Vulnerability Name:

CVE-2004-0644 (CCN-17160)

Assigned:2004-08-31
Published:2004-08-31
Updated:2020-01-21
Summary:The asn1buf_skiptail function in the ASN.1 decoder library for MIT Kerberos 5 (krb5) 1.2.2 through 1.3.4 allows remote attackers to cause a denial of service (infinite loop) via a certain BER encoding.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2004-0644

Source: CONECTIVA
Type: UNKNOWN
CLA-2004:860

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2004:860
Multiple vulnerabilities in Kerberos 5

Source: CCN
Type: AppleCare Knowledge Base Document 61798
Security Update 2004-12-02

Source: BUGTRAQ
Type: UNKNOWN
20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos)

Source: CCN
Type: RHSA-2004-350
krb5 security update

Source: REDHAT
Type: UNKNOWN
RHSA-2004:350

Source: CCN
Type: RHSA-2004-448
krb5 security update

Source: CCN
Type: Sun Alert ID: 57631
Security Vulnerabilities in the Kerberos KeyDistribution Center (KDC) Daemon and Kerberos V5 Libraries

Source: CCN
Type: MIT Kerberos Web site
Kerberos: The Network Authentication Protocol

Source: CCN
Type: MIT krb5 Security Advisory 2004-003
ASN.1 decoder denial of service

Source: CONFIRM
Type: UNKNOWN
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-003-asn1.txt

Source: CCN
Type: CIAC Information Bulletin P-049
Apple Security Update 2004-12-02

Source: CCN
Type: Cisco Security Advisory 2004 August 31 1830 UTC (GMT)
Vulnerabilities in Kerberos 5 Implementation

Source: DEBIAN
Type: UNKNOWN
DSA-543

Source: DEBIAN
Type: DSA-543
krb5 -- several vulnerabilities

Source: CCN
Type: GLSA-200409-09
MIT krb5: Multiple vulnerabilities

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200409-09

Source: CCN
Type: US-CERT VU#550464
MIT Kerberos 5 ASN.1 decoding function asn1buf_skiptail() does not properly terminate loop

Source: CERT-VN
Type: US Government Resource
VU#550464

Source: CCN
Type: OpenPKG-SA-2004.039
kerberos

Source: BID
Type: UNKNOWN
11079

Source: CCN
Type: BID-11079
MIT Kerberos 5 ASN.1 Decoder Denial Of Service Vulnerability

Source: TRUSTIX
Type: Patch, Vendor Advisory
2004-0045

Source: CCN
Type: TLSA-2004-22
Double-free vulnerabilities allow abritrary code execution

Source: CERT
Type: US Government Resource
TA04-247A

Source: XF
Type: UNKNOWN
kerberos-asn1-library-dos(17160)

Source: XF
Type: UNKNOWN
kerberos-asn1-library-dos(17160)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10014

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:2139

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9:*:x86:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9:*:sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10014
    V
    The asn1buf_skiptail function in the ASN.1 decoder library for MIT Kerberos 5 (krb5) 1.2.2 through 1.3.4 allows remote attackers to cause a denial of service (infinite loop) via a certain BER encoding.
    2013-04-29
    oval:org.mitre.oval:def:2139
    V
    Kerberos 5 ASN.1 Library DoS
    2005-02-23
    oval:com.redhat.rhsa:def:20040350
    P
    RHSA-2004:350: krb5 security update (Critical)
    2004-08-31
    oval:org.debian:def:543
    V
    several vulnerabilities
    2004-08-31
    BACK
    mit kerberos 5 1.2.2
    mit kerberos 5 1.2.3
    mit kerberos 5 1.2.4
    mit kerberos 5 1.2.5
    mit kerberos 5 1.2.6
    mit kerberos 5 1.2.7
    mit kerberos 5 1.2.8
    mit kerberos 5 1.3
    mit kerberos 5 1.3 alpha1
    mit kerberos 5 1.3.1
    mit kerberos 5 1.3.2
    mit kerberos 5 1.3.3
    mit kerberos 5 1.3.4
    mit kerberos 5-1.3
    mit kerberos 5-1.2.2
    mit kerberos 5-1.2.3
    mit kerberos 5-1.2.4
    mit kerberos 5-1.2.5
    mit kerberos 5-1.2.6
    mit kerberos 5-1.2.7
    mit kerberos 5-1.2.8
    mit kerberos 5-1.3.1
    mit kerberos 5-1.3.2
    mit kerberos 5-1.3.3
    mit kerberos 5-1.3.4
    mit kerberos 5-1.3 alpha1
    debian debian linux 3.0
    openpkg openpkg current
    gentoo linux *
    mandrakesoft mandrake multi network firewall 8.2
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    conectiva linux 9.0
    mandrakesoft mandrake linux 9.2
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    sun solaris 9
    openpkg openpkg 2.0
    mandrakesoft mandrake linux 10.0
    redhat enterprise linux 3
    conectiva linux 10
    openpkg openpkg 2.1
    apple mac os x 10.2.8
    apple mac os x server 10.2.8
    apple mac os x 10.3.6
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux corporate server 2.1
    apple mac os x server 10.3.6
    sun solaris 9