Lucene search

K
osvGoogleOSV:DSA-3153-1
HistoryFeb 03, 2015 - 12:00 a.m.

krb5 - security update

2015-02-0300:00:00
Google
osv.dev
12

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

86.5%

Multiple vulnerabilities have been found in krb5, the MIT
implementation of Kerberos:

  • CVE-2014-5352
    Incorrect memory management in the libgssapi_krb5 library might
    result in denial of service or the execution of arbitrary code.
  • CVE-2014-9421
    Incorrect memory management in kadmind’s processing of XDR data
    might result in denial of service or the execution of arbitrary code.
  • CVE-2014-9422
    Incorrect processing of two-component server principals might result
    in impersonation attacks.
  • CVE-2014-9423
    An information leak in the libgssrpc library.

For the stable distribution (wheezy), these problems have been fixed in
version 1.10.1+dfsg-5+deb7u3.

For the unstable distribution (sid), these problems have been fixed in
version 1.12.1+dfsg-17.

We recommend that you upgrade your krb5 packages.

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

86.5%