cve/2010/CVE-2010-1323.md

23 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2010-1323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
### POC
#### Reference
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.redhat.com/support/errata/RHSA-2010-0925.html
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CamiloEscobar98/DjangoProject
- https://github.com/blamhang/nopc