Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - MIT krb5: multiple vulnerabilities

February 2015 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker can use several vulnerabilities of MIT krb5.

Impacted products: Debian, MIT krb5, openSUSE, SUSE Linux
Enterprise Desktop, SLES, Ubuntu

Severity: 2/4

Creation date: 04/02/2015

DESCRIPTION OF THE VULNERABILITY

Several vulnerabilities were announced in MIT krb5.

An authenticated attacker can force the usage of a freed memory
area in gss_process_context_token(), in order to trigger a denial
of service, and possibly to execute code. [severity:2/4;
CVE-2014-5352]

An authenticated attacker can force the usage of a freed memory
area during the deserialization, in order to trigger a denial of
service, and possibly to execute code. [severity:2/4;
CVE-2014-9421]

An attacker who has the key of a principal like "kad/root" (starts
with a substring of "kadmin") can impersonate any user to kadmind.
[severity:2/4; CVE-2014-9422]

An attacker can read a memory fragment of libgssrpc, in order to
obtain sensitive information. [severity:1/4; CVE-2014-9423]

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/MIT-krb5-multiple-vulnerabilities-16104


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts