Description
The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-146-1 | krb5 security update |
Debian DSA |
DSA-3153-1 | krb5 security update |
EUVD |
EUVD-2014-9244 | The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field. |
Ubuntu USN |
USN-2498-1 | Kerberos vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:47:41.334Z
Reserved: 2014-12-26T00:00:00.000Z
Link: CVE-2014-9423
No data.
Status : Deferred
Published: 2015-02-19T11:59:07.500
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-9423
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN