SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(CentOS Issues Fix) MIT Kerberos Null Pointer Dereference Bugs Let Remote Authenticated Users Deny Service
SecurityTracker Alert ID:  1032057
SecurityTracker URL:  http://securitytracker.com/id/1032057
CVE Reference:   CVE-2014-5353   (Links to External Site)
Date:  Apr 9 2015
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   Two vulnerabilities were reported in MIT Kerberos. A remote authenticated user can cause denial of service conditions.

A remote authenticated user with privileges to set password policy and add or modify principals can attempt to use a named ticket policy object as a password policy for a principal to trigger a null pointer dereference in krb5_ldap_get_password_policy_from_dn() and cause the target system to crash [CVE-2014-5353].

Systems with kadmind configured to use LDAP for the KDC database are affected.

Patrik Kis reported this vulnerability.

A remote authenticated user can insert a principal entry that contains no long-term keys into the database to trigger a null pointer dereference in krb5_add_ber_mem_ldap_mod() and cause the target system to crash [CVE-2014-5354]. Versions prior to 1.12 are not affected.

Impact:   A remote authenticated user can cause the target system to crash.
Solution:   CentOS has issued a fix for CVE-2014-5353.

The CentOS advisory is available at:

http://lists.centos.org/pipermail/centos-announce/2015-April/021058.html

Vendor URL:  web.mit.edu/kerberos/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (CentOS)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Dec 16 2014 MIT Kerberos Null Pointer Dereference Bugs Let Remote Authenticated Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC