Vigil@nce - MIT krb5: multiple vulnerabilities
February 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of MIT krb5.
Impacted products: Debian, MIT krb5, openSUSE, SUSE Linux
Enterprise Desktop, SLES, Ubuntu
Severity: 2/4
Creation date: 04/02/2015
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in MIT krb5.
An authenticated attacker can force the usage of a freed memory
area in gss_process_context_token(), in order to trigger a denial
of service, and possibly to execute code. [severity:2/4;
CVE-2014-5352]
An authenticated attacker can force the usage of a freed memory
area during the deserialization, in order to trigger a denial of
service, and possibly to execute code. [severity:2/4;
CVE-2014-9421]
An attacker who has the key of a principal like "kad/root" (starts
with a substring of "kadmin") can impersonate any user to kadmind.
[severity:2/4; CVE-2014-9422]
An attacker can read a memory fragment of libgssrpc, in order to
obtain sensitive information. [severity:1/4; CVE-2014-9423]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/MIT-krb5-multiple-vulnerabilities-16104