Lucene search

K
mageiaGentoo FoundationMGASA-2015-0119
HistoryMar 28, 2015 - 12:12 a.m.

Updated krb5 package fixes security vulnerability

2015-03-2800:12:10
Gentoo Foundation
advisories.mageia.org
14

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.949 High

EPSS

Percentile

99.3%

MIT Kerberos 5 through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a ‘\0’ character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a zero-byte version string or cause a denial of service (out-of-bounds read) by omitting the ‘\0’ character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c (CVE-2014-5355).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchkrb5< 1.11.4-1.5krb5-1.11.4-1.5.mga4

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.949 High

EPSS

Percentile

99.3%