plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html - | |
References | () http://www.securityfocus.com/bid/71680 - | |
References | () http://www.securitytracker.com/id/1031376 - | |
References | () http://www.ubuntu.com/usn/USN-2498-1 - | |
References | () https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16 - |
Information
Published : 2014-12-16 23:59
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5354
Mitre link : CVE-2014-5354
CVE.ORG link : CVE-2014-5354
JSON object : View
Products Affected
mit
- kerberos_5
- kerberos
CWE