ID CVE-2013-1415
Summary The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request. Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
References
Vulnerable Configurations
  • cpe:2.3:a:mit:kerberos:-:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:-:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:4:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.3:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.3:alpha1:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.3:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.5:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.7:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.8:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.9:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.10:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos:5-1.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5-1.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
CVSS
Base: 7.1 (as of 11-10-2013 - 03:50)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:C
redhat via4
advisories
bugzilla
id 917840
title CVE-2012-1016 krb5: PKINIT null pointer deref leads to DoS
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhba:tst:20111656001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhba:tst:20111656002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhba:tst:20111656003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20111656004
  • OR
    • AND
      • comment krb5-devel is earlier than 0:1.10.3-10.el6_4.1
        oval oval:com.redhat.rhsa:tst:20130656009
      • comment krb5-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863012
    • AND
      • comment krb5-libs is earlier than 0:1.10.3-10.el6_4.1
        oval oval:com.redhat.rhsa:tst:20130656013
      • comment krb5-libs is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863016
    • AND
      • comment krb5-pkinit-openssl is earlier than 0:1.10.3-10.el6_4.1
        oval oval:com.redhat.rhsa:tst:20130656015
      • comment krb5-pkinit-openssl is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863008
    • AND
      • comment krb5-server is earlier than 0:1.10.3-10.el6_4.1
        oval oval:com.redhat.rhsa:tst:20130656011
      • comment krb5-server is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863010
    • AND
      • comment krb5-server-ldap is earlier than 0:1.10.3-10.el6_4.1
        oval oval:com.redhat.rhsa:tst:20130656005
      • comment krb5-server-ldap is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863006
    • AND
      • comment krb5-workstation is earlier than 0:1.10.3-10.el6_4.1
        oval oval:com.redhat.rhsa:tst:20130656007
      • comment krb5-workstation is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863014
rhsa
id RHSA-2013:0656
released 2013-03-18
severity Moderate
title RHSA-2013:0656: krb5 security update (Moderate)
rpms
  • krb5-devel-0:1.10.3-10.el6_4.1
  • krb5-libs-0:1.10.3-10.el6_4.1
  • krb5-pkinit-openssl-0:1.10.3-10.el6_4.1
  • krb5-server-0:1.10.3-10.el6_4.1
  • krb5-server-ldap-0:1.10.3-10.el6_4.1
  • krb5-workstation-0:1.10.3-10.el6_4.1
refmap via4
confirm
mandriva MDVSA-2013:157
secunia 55040
suse openSUSE-SU-2013:0523
Last major update 11-10-2013 - 03:50
Published 05-03-2013 - 05:05
Last modified 21-01-2020 - 15:46
Back to Top