CVE-2010-1324
moderate-risk
Published 2010-12-02
MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
Do I need to act?
~
3.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.7/10
Low
NETWORK
/ HIGH complexity
Affected Products (6)
Affected Vendors
References (54)
Vendor Advisory
http://secunia.com/advisories/42399
Vendor Advisory
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
and 34 more references
33
/ 100
moderate-risk
Severity
13/34 · Low
Exploitability
7/34 · Low
Exposure
13/34 · Low