CVE-2014-9423CVE-2014-9423

Affected configuration(s):

cpe:/a:mit:kerberos:5-1.11
cpe:/a:mit:kerberos:5-1.11.1
cpe:/a:mit:kerberos:5-1.11.2
cpe:/a:mit:kerberos:5-1.11.3
cpe:/a:mit:kerberos:5-1.11.4
cpe:/a:mit:kerberos:5-1.11.5
cpe:/a:mit:kerberos:5-1.12
cpe:/a:mit:kerberos:5-1.12.1
cpe:/a:mit:kerberos:5-1.12.2
cpe:/a:mit:kerberos:5-1.13

Date published: 2015-02-19T06:59:07.500-05:00

Date last modified: 2016-11-28T14:13:56.747-05:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html

Summary: The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.