Lucene search

K
f5F5F5:K16442
HistoryApr 15, 2015 - 12:00 a.m.

K16442 : MIT Kerberos 5 vulnerability CVE-2014-9422

2015-04-1500:00:00
my.f5.com
23

8.7 High

AI Score

Confidence

High

6.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:P/I:P/A:C

0.008 Low

EPSS

Percentile

79.9%

Security Advisory Description

The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial “kadmind” substring, as demonstrated by a “ka/x” principal. (CVE-2014-9422)
Impact
An authenticated remote attacker may be able to gain admin privilege escalation to an ARX system configured to perform Kerberos authentication.

8.7 High

AI Score

Confidence

High

6.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:P/I:P/A:C

0.008 Low

EPSS

Percentile

79.9%