DSA-3466-1 krb5 -- krb5ID: oval:org.secpod.oval:def:602366 | Date: (C)2016-02-29 (M)2023-09-11 |
Class: PATCH | Family: unix |
Several vulnerabilities were discovered in krb5, the MIT implementation of Kerberos. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-8629 It was discovered that an authenticated attacker can cause kadmind to read beyond the end of allocated memory by sending a string without a terminating zero byte. Information leakage may be possible for an attacker with permission to modify the database. CVE-2015-8630 It was discovered that an authenticated attacker with permission to modify a principal entry can cause kadmind to dereference a null pointer by supplying a null policy value but including KADM5_POLICY in the mask. CVE-2015-8631 It was discovered that an authenticated attacker can cause kadmind to leak memory by supplying a null principal name in a request which uses one. Repeating these requests will eventually cause kadmind to exhaust all available memory.
Platform: |
Debian 8.x |
Debian 7.x |
Product: |
krb5-kdc |
krb5-kdc-ldap |
krb5-admin-server |