mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
192 lines
6.4 KiB
JSON
192 lines
6.4 KiB
JSON
{
|
|
"id": "CVE-2003-0082",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-04-02T05:00:00.000",
|
|
"lastModified": "2020-01-21T15:47:39.353",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes the KDC to corrupt its heap (aka \"buffer underrun\")."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El KDC (Centro de Distribuci\u00f3n de Claves) en Kerberos 5 (krb5) 1.2.7 y anteriores, permite a atacantes remotos autentificados, causar la Denegaci\u00f3n de Servicios (ca\u00edda) en KDCs dentro del mismo dominio utilizando cierta petici\u00f3n de protocolo que produce la corrupci\u00f3n de la pila del KDC (tambi\u00e9n conocida como 'buffer underrun')."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ACC18A69-28AC-4DED-AA9D-B050709A9D43"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos:1.2.2.beta1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D65D5B46-F8BD-41C4-86F2-D495F1EB4F47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8973E93-0BBE-4BD3-9983-F6480FFEA228"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A37987D-22F9-47AC-A07A-380F7E509BFE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE8C0C82-749E-4837-88F8-FB56A753B094"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8AD672FA-918D-48CB-BC03-4E412AF0DCCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D0B363A4-BB7A-48A2-AE6B-BD2DDD46E7CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74EF42A5-EC47-4475-81D6-FD1E9C2B8A3C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "30F2CBEF-6FA1-4E07-8163-6AFEDC93FCE5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D133CB0D-8A54-4DAA-9FE8-0B367544DE65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B2C23BD-1995-4F09-B444-87DDDE21817E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EEF118BE-6351-4768-A3F0-DFE0065273D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6B1422F8-CC87-46EA-8649-A12D6E47335D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-54042-1",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-005-buf.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2003/dsa-266",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-051.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-052.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-091.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/316960/30/25250/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/7185",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A244",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2536",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4430",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |