CVE-2014-9421

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.

References

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html

http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html

http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html

http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html

http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html

http://rhn.redhat.com/errata/RHSA-2015-0439.html

http://rhn.redhat.com/errata/RHSA-2015-0794.html

http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt

http://www.debian.org/security/2015/dsa-3153

http://www.mandriva.com/security/advisories?name=MDVSA-2015:069

http://www.securityfocus.com/bid/72496

http://www.ubuntu.com/usn/USN-2498-1

https://github.com/krb5/krb5/commit/a197e92349a4aa2141b5dff12e9dd44c2a2166e3

Details

Source: MITRE

Published: 2015-02-19

Updated: 2020-01-21

Risk Information

CVSS v2

Base Score: 9

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8

Severity: HIGH

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
83874AIX NAS Advisory : nas_advisory3.ascNessusAIX Local Security Checks
high
83683SUSE SLED12 / SLES12 Security Update : krb5 (SUSE-SU-2015:0290-2)NessusSuSE Local Security Checks
high
83682SUSE SLES12 Security Update : krb5 (SUSE-SU-2015:0290-1)NessusSuSE Local Security Checks
high
83269Amazon Linux AMI : krb5 (ALAS-2015-518)NessusAmazon Linux Local Security Checks
high
82694Scientific Linux Security Update : krb5 on SL6.x i386/x86_64 (20150409)NessusScientific Linux Local Security Checks
high
82692OracleVM 3.3 : krb5 (OVMSA-2015-0054)NessusOracleVM Local Security Checks
high
82689Oracle Linux 6 : krb5 (ELSA-2015-0794)NessusOracle Linux Local Security Checks
high
82667CentOS 6 : krb5 (CESA-2015:0794)NessusCentOS Local Security Checks
high
82656RHEL 6 : krb5 (RHSA-2015:0794)NessusRed Hat Local Security Checks
high
82322Mandriva Linux Security Advisory : krb5 (MDVSA-2015:069)NessusMandriva Local Security Checks
high
82255Scientific Linux Security Update : krb5 on SL7.x x86_64 (20150305)NessusScientific Linux Local Security Checks
high
82129Debian DLA-146-1 : krb5 security updateNessusDebian Local Security Checks
high
81896CentOS 7 : krb5 (CESA-2015:0439)NessusCentOS Local Security Checks
high
81805Oracle Linux 7 : krb5 (ELSA-2015-0439)NessusOracle Linux Local Security Checks
high
81796Fedora 21 : krb5-1.12.2-14.fc21 (2015-2347)NessusFedora Local Security Checks
high
81705Fedora 20 : krb5-1.11.5-18.fc20 (2015-2382)NessusFedora Local Security Checks
high
81637RHEL 7 : krb5 (RHSA-2015:0439)NessusRed Hat Local Security Checks
high
81312SuSE 11.3 Security Update : krb5 (SAT Patch Number 10282)NessusSuSE Local Security Checks
high
81304openSUSE Security Update : krb5 (openSUSE-2015-128)NessusSuSE Local Security Checks
high
81297Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS / 14.10 : krb5 vulnerabilities (USN-2498-1)NessusUbuntu Local Security Checks
high
81175FreeBSD : krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092 (24ce5597-acab-11e4-a847-206a8a720317)NessusFreeBSD Local Security Checks
high
81150Debian DSA-3153-1 : krb5 - security updateNessusDebian Local Security Checks
high