The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-146-1 krb5 security update
Debian DSA Debian DSA DSA-3153-1 krb5 security update
EUVD EUVD EUVD-2014-9244 The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
Ubuntu USN Ubuntu USN USN-2498-1 Kerberos vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T13:47:41.334Z

Reserved: 2014-12-26T00:00:00

Link: CVE-2014-9423

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-02-19T11:59:07.500

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-9423

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-02-03T00:00:00Z

Links: CVE-2014-9423 - Bugzilla

cve-icon OpenCVE Enrichment

No data.