Vulnerabilities > CVE-2011-0043 - Cryptographic Issues vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Kerberos in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 supports weak hashing algorithms, which allows local users to gain privileges by operating a service that sends crafted service tickets, as demonstrated by the CRC32 algorithm, aka "Kerberos Unkeyed Checksum Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Msbulletin
bulletin_id | MS11-013 |
bulletin_url | |
date | 2011-02-08T00:00:00 |
impact | Elevation of Privilege |
knowledgebase_id | 2496930 |
knowledgebase_url | |
severity | Important |
title | Vulnerabilities in Kerberos Could Allow Elevation of Privilege |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-013.NASL |
description | The implementation of Kerberos on the remote Windows host is affected by one or more vulnerabilities : - Microsoft |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 51913 |
published | 2011-02-08 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/51913 |
title | MS11-013: Vulnerabilities in Kerberos Could Allow Elevation of Privilege (2496930) |
code |
|
Oval
accepted | 2011-08-15T04:00:07.212-04:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||
description | Kerberos in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 supports weak hashing algorithms, which allows local users to gain privileges by operating a service that sends crafted service tickets, as demonstrated by the CRC32 algorithm, aka "Kerberos Unkeyed Checksum Vulnerability." | ||||||||||||||||||||
family | windows | ||||||||||||||||||||
id | oval:org.mitre.oval:def:12432 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2011-02-09T14:23:12 | ||||||||||||||||||||
title | Kerberos Unkeyed Checksum Vulnerability | ||||||||||||||||||||
version | 74 |
References
- http://osvdb.org/70834
- http://secunia.com/advisories/43251
- http://support.avaya.com/css/P8/documents/100127250
- http://www.securityfocus.com/bid/46130
- http://www.securitytracker.com/id?1025048
- http://www.vupen.com/english/advisories/2011/0326
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64900
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12432
- http://osvdb.org/70834
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12432
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64900
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013
- http://www.vupen.com/english/advisories/2011/0326
- http://www.securitytracker.com/id?1025048
- http://www.securityfocus.com/bid/46130
- http://support.avaya.com/css/P8/documents/100127250
- http://secunia.com/advisories/43251