Page 5 of 124 results (0.015 seconds)

CVSS: 5.8EPSS: 0%CPEs: 6EXPL: 0

The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c. Los módulos kdcpreauth en MIT Kerberos 5 (también conocido como krb5) 1.12.x y 1.13.x anterior a 1.13.2 no rastrea correctamente si la solicitud de un cliente ha sido validada, lo que permite a atacantes remotos evadir un requisito de preautenticación mediante la provisión de (1) cero bytes de datos o (2) un nombre de ámbito (realm) arbitrario, relacionado con plugins/preauth/otp/main.c y plugins/preauth/pkinit/pkinit_srv.c. A flaw was found in the OTP kdcpreauth module of MIT Kerberos. A remote attacker could use this flaw to bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal's long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user's password. • http://krbdev.mit.edu/rt/Ticket/Display.html?id=8160 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/74824 http://www.ubuntu.com/usn/USN-2810-1 https://github.com/krb5/krb5/commit/e3b5a5e5267818c97750b266df50b6a3d4649604 https://access.redhat.com/security/cve/CVE-2015-2694 https://bugzilla.redhat.com/show_bug.cgi?id=1216133 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 95%CPEs: 60EXPL: 0

MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c. MIT Kerberos 5 (también conocido como krb5) hasta 1.13.1 espera incorrectamente que un campo de datos krb5_read_message se representa como una cadena que termine con un caracter '\0', lo que permite a atacantes remotos (1) causar una denegación de servicio (referencia a puntero nulo) a través de una cadena de versión de cero bytes o (2) causar una denegación de servicio (lectura fuera de rango) mediante la omisión del caracter '\0', relacionado con appl/user_user/server.c y lib/krb5/krb/recvauth.c. It was found that the krb5_read_message() function of MIT Kerberos did not correctly sanitize input, and could create invalid krb5_data objects. A remote, unauthenticated attacker could use this flaw to crash a Kerberos child process via a specially crafted request. • http://krbdev.mit.edu/rt/Ticket/Display.html?id=8050 http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html http://rhn.redhat.com/errata/RHSA-2015-0794.html http://www.mandriva.com/security/advisories?name=MDVSA-2015:069 http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html http://www.securityfocus.com/bid/74042 http://www.ubuntu.com/usn/USN-2810-1 https://github.com • CWE-476: NULL Pointer Dereference •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field. La función svcauth_gss_accept_sec_context en lib/rpc/svc_auth_gss.c en MIT Kerberos 5 (también conocido como krb5) 1.11.x hasta 1.11.5, 1.12.x hasta 1.12.2, y 1.13.x anterior a 1.13.1 trasmite datos intercalados no inicializados a clientes, lo que permite a atacantes remotos obtener información sensible de la memoria dinámica de procesos mediante la captura de trafico de la red para datos en un campo de manejo (handle). An information disclosure flaw was found in the way MIT Kerberos RPCSEC_GSS implementation (libgssrpc) handled certain requests. An attacker could send a specially crafted request to an application using libgssrpc to disclose a limited portion of uninitialized memory used by that application. • http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html http://rhn.redhat.com/errata/RHSA-2015-0439.html http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt http://we • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 9.0EPSS: 1%CPEs: 10EXPL: 0

The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind. La función auth_gssapi_unwrap_data en lib/rpc/auth_gssapi_misc.c en MIT Kerberos 5 (también conocido como krb5) hasta 1.11.5, 1.12.x hasta 1.12.2, y 1.13.x anterior a 1.13.1 no maneja correctamente la deserialización XDR parcial, lo que permite a usuarios remotos autenticados causar una denegación de servicio (uso después de liberación y doble liberación, y caída del demonio) o posiblemente ejecutar código arbitrario a través de datos XDR malformados, tal y como fue demostrado mediante datos enviados a kadmind. A double-free flaw was found in the way MIT Kerberos handled invalid External Data Representation (XDR) data. An authenticated user could use this flaw to crash the MIT Kerberos administration server (kadmind), or other applications using Kerberos libraries, using specially crafted XDR packets. • http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html http://rhn.redhat.com/errata/RHSA-2015-0439.html http://rhn.redhat.com/errata/RHSA-2015-0794.html http://web.mit.edu/ • CWE-416: Use After Free •

CVSS: 6.1EPSS: 0%CPEs: 10EXPL: 0

The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal. La función check_rpcsec_auth en kadmin/server/kadm_rpc_svc.c en kadmind en MIT Kerberos 5 (también conocido como krb5) hasta 1.11.5, 1.12.x hasta 1.12.2, y 1.13.x anterior a 1.13.1 permite a usuarios remotos autenticados evadir una comprobación de la autorización kadmin/* y obtener acceso administrativo mediante el aprovechamiento del acceso a un principal de dos componentes con una subcadena 'kadmind' inicial, tal y como fue demostrado por un principal 'ka/x'. It was found that the MIT Kerberos administration server (kadmind) incorrectly accepted certain authentication requests for two-component server principal names. A remote attacker able to acquire a key with a particularly named principal (such as "kad/x") could use this flaw to impersonate any user to kadmind, and perform administrative actions as that user. • http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151437.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html http://rhn.redhat.com/errata/RHSA-2015-0439.html http://rhn.redhat.com/errata/RHSA-2015-0794.html http://web.mit.edu/ • CWE-284: Improper Access Control CWE-305: Authentication Bypass by Primary Weakness •