Lucene search

K
freebsdFreeBSD3A888A1E-B321-11E4-83B2-206A8A720317
HistoryFeb 12, 2015 - 12:00 a.m.

krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092

2015-02-1200:00:00
vuxml.freebsd.org
8

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

0.009 Low

EPSS

Percentile

82.2%

The MIT Kerberos team reports:

CVE-2014-5353: The krb5_ldap_get_password_policy_from_dn
function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in
MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP,
allows remote authenticated users to cause a denial of service
(daemon crash) via a successful LDAP query with no results, as
demonstrated by using an incorrect object type for a password
policy.
CVE-2014-5354: plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in
MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when
the KDC uses LDAP, allows remote authenticated users to cause a
denial of service (NULL pointer dereference and daemon crash) by
creating a database entry for a keyless principal, as
demonstrated by a kadmin “add_principal -nokey” or “purgekeys
-all” command.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchkrb5< 1.13.1UNKNOWN
FreeBSDanynoarchkrb5-112< 1.12.2_2UNKNOWN
FreeBSDanynoarchkrb5-111< 1.11.5_5UNKNOWN

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

0.009 Low

EPSS

Percentile

82.2%