Search for vulnerabilities
Vulnerability details: VCID-ndvs-xrd6-aaaq
Vulnerability ID VCID-ndvs-xrd6-aaaq
Aliases CVE-2011-0285
Summary The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2011:0447
epss 0.19683 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.19683 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.19683 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.19683 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.24564 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.32106 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.32106 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.32106 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.32106 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.32106 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.32106 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34161 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.34547 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
epss 0.51658 https://api.first.org/data/v1/epss?cve=CVE-2011-0285
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=696334
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2011-0285
Reference id Reference type URL
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726
http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html
http://osvdb.org/71789
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0285.json
https://api.first.org/data/v1/epss?cve=CVE-2011-0285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285
http://secunia.com/advisories/44125
http://secunia.com/advisories/44181
http://secunia.com/advisories/44196
http://securityreason.com/securityalert/8200
https://hermes.opensuse.org/messages/8086843
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt
http://www.mandriva.com/security/advisories?name=MDVSA-2011:077
http://www.redhat.com/support/errata/RHSA-2011-0447.html
http://www.securityfocus.com/archive/1/517484/100/0/threaded
http://www.securityfocus.com/bid/47310
http://www.securitytracker.com/id?1025320
http://www.vupen.com/english/advisories/2011/0936
http://www.vupen.com/english/advisories/2011/0986
http://www.vupen.com/english/advisories/2011/0997
622681 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622681
696334 https://bugzilla.redhat.com/show_bug.cgi?id=696334
cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
CVE-2011-0285 https://nvd.nist.gov/vuln/detail/CVE-2011-0285
CVE-2011-0285;OSVDB-71789 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35606.txt
CVE-2011-0285;OSVDB-71789 Exploit https://www.securityfocus.com/bid/47310/info
GLSA-201201-13 https://security.gentoo.org/glsa/201201-13
RHSA-2011:0447 https://access.redhat.com/errata/RHSA-2011:0447
USN-1116-1 https://usn.ubuntu.com/1116-1/
Data source Exploit-DB
Date added April 11, 2011
Description MIT Kerberos 5 - kadmind Change Password Feature Remote Code Execution
Ransomware campaign use Known
Source publication date April 11, 2011
Exploit type remote
Platform linux
Source update date Dec. 25, 2014
Source URL https://www.securityfocus.com/bid/47310/info
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2011-0285
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.96298
EPSS Score 0.19683
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.