SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(Ubuntu Issues Fix) MIT Kerberos Null Pointer Dereference Bugs Let Remote Authenticated Users Deny Service
SecurityTracker Alert ID:  1031738
SecurityTracker URL:  http://securitytracker.com/id/1031738
CVE Reference:   CVE-2014-5353, CVE-2014-5354   (Links to External Site)
Date:  Feb 11 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   Two vulnerabilities were reported in MIT Kerberos. A remote authenticated user can cause denial of service conditions.

A remote authenticated user with privileges to set password policy and add or modify principals can attempt to use a named ticket policy object as a password policy for a principal to trigger a null pointer dereference in krb5_ldap_get_password_policy_from_dn() and cause the target system to crash [CVE-2014-5353].

Systems with kadmind configured to use LDAP for the KDC database are affected.

Patrik Kis reported this vulnerability.

A remote authenticated user can insert a principal entry that contains no long-term keys into the database to trigger a null pointer dereference in krb5_add_ber_mem_ldap_mod() and cause the target system to crash [CVE-2014-5354]. Versions prior to 1.12 are not affected.

Impact:   A remote authenticated user can cause the target system to crash.
Solution:   Ubuntu has issued a fix.

The Ubuntu advisory is available at:

http://www.ubuntu.com/usn/usn-2498-1

Vendor URL:  web.mit.edu/kerberos/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  10.04 LTS, 12.04 LTS, 14.04 LTS, 14.10

Message History:   This archive entry is a follow-up to the message listed below.
Dec 16 2014 MIT Kerberos Null Pointer Dereference Bugs Let Remote Authenticated Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC