The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-146-1 | krb5 security update |
Debian DSA |
DSA-3153-1 | krb5 security update |
EUVD |
EUVD-2014-9244 | The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field. |
Ubuntu USN |
USN-2498-1 | Kerberos vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:47:41.334Z
Reserved: 2014-12-26T00:00:00
Link: CVE-2014-9423
No data.
Status : Deferred
Published: 2015-02-19T11:59:07.500
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-9423
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN