CVE-2019-14867

A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*
cpe:2.3:a:freeipa:freeipa:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

History

21 Nov 2024, 04:27

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHBA-2019:4268 - () https://access.redhat.com/errata/RHBA-2019:4268 -
References () https://access.redhat.com/errata/RHSA-2020:0378 - () https://access.redhat.com/errata/RHSA-2020:0378 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867 - Issue Tracking, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/ -
References () https://www.freeipa.org/page/Releases/4.6.7 - Release Notes () https://www.freeipa.org/page/Releases/4.6.7 - Release Notes
References () https://www.freeipa.org/page/Releases/4.7.4 - Release Notes () https://www.freeipa.org/page/Releases/4.7.4 - Release Notes
References () https://www.freeipa.org/page/Releases/4.8.3 - Release Notes () https://www.freeipa.org/page/Releases/4.8.3 - Release Notes

07 Nov 2023, 03:05

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/', 'name': 'FEDORA-2019-c64e1612f5', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/', 'name': 'FEDORA-2019-8e9093da55', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/ -

Information

Published : 2019-11-27 09:15

Updated : 2024-11-21 04:27


NVD link : CVE-2019-14867

Mitre link : CVE-2019-14867

CVE.ORG link : CVE-2019-14867


JSON object : View

Products Affected

fedoraproject

  • fedora

freeipa

  • freeipa
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-400

Uncontrolled Resource Consumption