Description
The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
Published: 2015-02-19
Score: 5.0 Medium
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-146-1 krb5 security update
Debian DSA Debian DSA DSA-3153-1 krb5 security update
EUVD EUVD EUVD-2014-9244 The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
Ubuntu USN Ubuntu USN USN-2498-1 Kerberos vulnerabilities
History

No history.

Subscriptions

Mit Kerberos 5
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T13:47:41.334Z

Reserved: 2014-12-26T00:00:00.000Z

Link: CVE-2014-9423

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-02-19T11:59:07.500

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-9423

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-02-03T00:00:00Z

Links: CVE-2014-9423 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses