CVE-2010-1321 heimdal


2017-12-29 23:00
CVE-2010-1321 krb5
2017-12-29 21:03
2017-06-18 07:03
2017-06-16 18:53
2017-04-01 19:11
2017-01-05 20:15


The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
buster heimdal 1.4.0~git20100605.dfsg.1-1
jessie heimdal 1.4.0~git20100605.dfsg.1-1
sid heimdal 1.4.0~git20100605.dfsg.1-1
stretch heimdal 1.4.0~git20100605.dfsg.1-1
wheezy heimdal 1.4.0~git20100605.dfsg.1-1