MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
02 Feb 2021, 19:00
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 | |
CPE | cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* |
References | (SECUNIA) http://secunia.com/advisories/59102 - Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/94904 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/60448 - Third Party Advisory | |
References | (CONFIRM) https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73 - Patch, Third Party Advisory | |
References | (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/68909 - Third Party Advisory, VDB Entry | |
References | (SECTRACK) http://www.securitytracker.com/id/1030706 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/60082 - Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2014:165 - Third Party Advisory | |
References | (CONFIRM) http://advisories.mageia.org/MGASA-2014-0345.html - Third Party Advisory | |
References | (CONFIRM) http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc - Third Party Advisory |
Information
Published : 2014-07-20 11:12
Updated : 2023-12-10 11:31
NVD link : CVE-2014-4341
Mitre link : CVE-2014-4341
CVE.ORG link : CVE-2014-4341
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux_server_eus
- enterprise_linux_eus
- enterprise_linux_tus
fedoraproject
- fedora
debian
- debian_linux
mit
- kerberos_5
CWE
CWE-125
Out-of-bounds Read