CVE-2010-0433

CVSS V2 Medium 4.3 CVSS V3 None
Description
The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
Overview
  • CVE ID
  • CVE-2010-0433
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2010-03-05T19:30:00
  • Last Modified Date
  • 2023-02-13T04:16:27
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1 OR 0.9.8m
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
https://bugzilla.redhat.com/show_bug.cgi?id=569774
http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7
http://www.openwall.com/lists/oss-security/2010/03/03/5
http://cvs.openssl.org/chngview?cn=19374
http://www.mail-archive.com/dovecot@dovecot.org/msg26224.html
http://www.openssl.org/news/changelog.html
https://bugzilla.redhat.com/show_bug.cgi?id=567711
http://www.vupen.com/english/advisories/2010/0839
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html
http://www.vupen.com/english/advisories/2010/0933
http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
http://secunia.com/advisories/39461
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
http://www.vupen.com/english/advisories/2010/0916
http://www.vupen.com/english/advisories/2010/1216
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc
http://secunia.com/advisories/39932
https://kb.bluecoat.com/index?page=content&id=SA50
http://secunia.com/advisories/42733
http://secunia.com/advisories/42724
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
http://secunia.com/advisories/43311
http://marc.info/?l=bugtraq&m=127128920008563&w=2
http://marc.info/?l=bugtraq&m=127557640302499&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9856
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6718
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12260
http://www.securityfocus.com/archive/1/516397/100/0/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:31:15 Added to TrackCVE
2023-02-13 05:03:30 2023-02-13T04:16:27 CVE Modified Date updated