Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-1321

EPSS 1.86% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2010-1321

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
MIT Kerberos GSS-API校验和空指针引用拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Kerberos是美国麻省理工学院(MIT)开发的一套网络认证协议,它采用客户端/服务器结构,并且客户端和服务器端均可对对方进行身份认证(即双重验证),可防止窃听、防止replay攻击等。MIT Kerberos 5(又名krb5)是美国麻省理工学院(MIT)开发的一套网络认证协议,它采用客户端/服务器结构,并且客户端和服务器端均可对对方进行身份认证(即双重验证),可防止窃听、防止replay攻击等。 MIT Kerberos的GSS-API库中存在空指针引用错误,krb5/accept_sec_cont
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2010-1321

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2010-1321

登录查看更多情报信息。

Same Patch Batch · n/a · 2010-05-19 · 20 CVEs total

CVE-2010-1980Joomla!组件Joomla Flickr 'controller'参数本地文件包含漏洞
CVE-2010-1985Six Apart Movable Type管理用户接口多个跨站脚本攻击漏洞
CVE-2010-1630phpBB 'posting.php'未明漏洞
CVE-2010-1629Phorum跨站脚本攻击漏洞
CVE-2010-1628Artifex Ghostscript无限递归调用远程代码执行漏洞
CVE-2010-1627phpBB 'feed.php'错误权限检查漏洞
CVE-2010-1984Drupal Taxonomy Breadcrumb模块跨站脚本攻击漏洞
CVE-2010-1983Redcomponent redTWITTER目录遍历漏洞
CVE-2010-1982Joomlart JA Voice目录遍历漏洞
CVE-2010-1981Fabrikar Fabrik目录遍历漏洞
CVE-2010-1169PostgreSQL PL/perl存储过程安全限制绕过漏洞
CVE-2010-1979Affiliate Datafeeds (com_datafeeds)目录遍历漏洞
CVE-2010-1978FreePHPBlogSoftware 'default_theme.php'远程文件包含漏洞
CVE-2010-1977Gohigheris J!WHMCS Integrator目录遍历漏洞
CVE-2010-1976Drupal Taxonomy Breadcrumb模块跨站脚本攻击漏洞
CVE-2010-1975PostgreSQL RESET ALL操作过程访问控制漏洞
CVE-2010-1454VMware SpringSource tc Server JMX接口绕过认证漏洞
CVE-2010-1447PostgreSQL PL/perl程序访问限制绕过漏洞
CVE-2010-1170PostgreSQL PL/tcl存储过程绕过安全限制漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2010-1321

No comments yet


Leave a comment