Lucene search

K
mageiaGentoo FoundationMGASA-2014-0477
HistoryNov 21, 2014 - 3:44 p.m.

Updated krb5 packages fix security vulnerability

2014-11-2115:44:16
Gentoo Foundation
advisories.mageia.org
10

2.1 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:S/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

66.0%

The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access (CVE-2014-5351).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchkrb5< 1.11.1-1.5krb5-1.11.1-1.5.mga3
Mageia4noarchkrb5< 1.11.4-1.2krb5-1.11.4-1.2.mga4

2.1 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:S/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

66.0%