Description
The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
Published: 2015-02-19
Score: 9.0 Critical
EPSS: 5.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-146-1 krb5 security update
Debian DSA Debian DSA DSA-3153-1 krb5 security update
EUVD EUVD EUVD-2014-5241 The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
Ubuntu USN Ubuntu USN USN-2498-1 Kerberos vulnerabilities
History

No history.

Subscriptions

Mit Kerberos 5
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T11:41:48.869Z

Reserved: 2014-08-19T00:00:00.000Z

Link: CVE-2014-5352

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2015-02-19T11:59:00.047

Modified: 2026-05-06T22:30:45.220

Link: CVE-2014-5352

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-02-03T00:00:00Z

Links: CVE-2014-5352 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses