[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3466-1 krb5 -- krb5

ID: oval:org.secpod.oval:def:602366Date: (C)2016-02-29   (M)2023-09-11
Class: PATCHFamily: unix




Several vulnerabilities were discovered in krb5, the MIT implementation of Kerberos. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-8629 It was discovered that an authenticated attacker can cause kadmind to read beyond the end of allocated memory by sending a string without a terminating zero byte. Information leakage may be possible for an attacker with permission to modify the database. CVE-2015-8630 It was discovered that an authenticated attacker with permission to modify a principal entry can cause kadmind to dereference a null pointer by supplying a null policy value but including KADM5_POLICY in the mask. CVE-2015-8631 It was discovered that an authenticated attacker can cause kadmind to leak memory by supplying a null principal name in a request which uses one. Repeating these requests will eventually cause kadmind to exhaust all available memory.

Platform:
Debian 8.x
Debian 7.x
Product:
krb5-kdc
krb5-kdc-ldap
krb5-admin-server
Reference:
DSA-3466-1
CVE-2015-8629
CVE-2015-8630
CVE-2015-8631
CVE    3
CVE-2015-8629
CVE-2015-8630
CVE-2015-8631
CPE    5
cpe:/a:mit:krb5-admin-server
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x
cpe:/a:mit:krb5-kdc-ldap
...

© SecPod Technologies