Vulnerability Name:

CVE-2012-1014 (CCN-77319)

Assigned:2012-07-31
Published:2012-07-31
Updated:2020-01-21
Summary:The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.
CVSS v3 Severity:8.6 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C)
6.6 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C)
6.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2012-1014

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2012:0967

Source: CCN
Type: SA50041
Kerberos KDC Two Memory Corruption Vulnerabilities

Source: CONFIRM
Type: Patch, Vendor Advisory
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt

Source: CCN
Type: MITKRB5-SA-2012-001
KDC heap corruption and crash vulnerabilities

Source: DEBIAN
Type: UNKNOWN
DSA-2518

Source: DEBIAN
Type: DSA-2518
krb5 -- denial of service and remote code execution

Source: CCN
Type: OSVDB ID: 84424
MIT Kerberos 5 src/kdc/kdc_util.c kdc_handle_protected_negotiation() Function Checksum Creation Key Type Verification AS-REQ Parsing Remote Code Execution

Source: CCN
Type: BID-54750
MIT Kerberos 5 Uninitialized Pointer Dereference Remote Multiple Denial of Service Vulnerabilities

Source: XF
Type: UNKNOWN
kerberos-asreq-code-execution(77319)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.10:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20121014
    V
    CVE-2012-1014
    2022-05-20
    oval:org.mitre.oval:def:17877
    P
    USN-1520-1 -- krb5 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:20176
    P
    DSA-2518-1 krb5 - denial of service
    2014-06-23
    oval:com.ubuntu.precise:def:20121014000
    V
    CVE-2012-1014 on Ubuntu 12.04 LTS (precise) - medium.
    2012-08-06
    BACK
    mit kerberos 5 1.10
    mit kerberos 5 1.10.1
    mit kerberos 5 1.10.2
    mit kerberos 5-1.10.1
    mit kerberos 5-1.10