ALT-BU-2015-2666-1
Branch c7 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2012-0862
builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
- FEDORA-2012-8061
- FEDORA-2012-8041
- RHSA-2013:1302
- MDVSA-2012:155
- [oss-security] 20120509 CVE-2012-0862 assignment notification: xinetd enables unintentional services over tcpmux port
- [oss-security] 20120510 Re: CVE-2012-0862 assignment notification: xinetd enables unintentional services over tcpmux port
- 81774
- 53720
- 1027050
- http://www.xinetd.org/#changes
- https://bugzilla.redhat.com/attachment.cgi?id=583311
- https://bugzilla.redhat.com/show_bug.cgi?id=790940
- xinetd-tcpmux-weak-security(75965)
- FEDORA-2012-8061
- xinetd-tcpmux-weak-security(75965)
- https://bugzilla.redhat.com/show_bug.cgi?id=790940
- https://bugzilla.redhat.com/attachment.cgi?id=583311
- http://www.xinetd.org/#changes
- 1027050
- 53720
- 81774
- [oss-security] 20120510 Re: CVE-2012-0862 assignment notification: xinetd enables unintentional services over tcpmux port
- [oss-security] 20120509 CVE-2012-0862 assignment notification: xinetd enables unintentional services over tcpmux port
- MDVSA-2012:155
- RHSA-2013:1302
- FEDORA-2012-8041
Closed bugs
Нет поддержки systemd
xinetd: Необходимо обеспечить совместимость службы с systemd
Closed vulnerabilities
BDU:2015-07058
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-07060
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-07061
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-07062
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-07064
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-07066
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-07068
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09060
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09061
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09062
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09063
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09064
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09065
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09066
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-4449
The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwm_conn_destroy to free the session context while it is being used by rwm_op_search.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- RHSA-2014:0126
- RHSA-2014:0126
- RHSA-2014:0206
- RHSA-2014:0206
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20140401 Cisco Unified Communications Manager Denial of Service Vulnerability
- 20140401 Cisco Unified Communications Manager Denial of Service Vulnerability
- DSA-3209
- DSA-3209
- MDVSA-2014:026
- MDVSA-2014:026
- http://www.openldap.org/its/index.cgi/Incoming?id=7723
- http://www.openldap.org/its/index.cgi/Incoming?id=7723
- [oss-security] 20131018 Re: CVE request: slapd segfaults on certain queries with rwm overlay enabled
- [oss-security] 20131018 Re: CVE request: slapd segfaults on certain queries with rwm overlay enabled
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 63190
- 63190
- 1029711
- 1029711
- https://bugzilla.redhat.com/show_bug.cgi?id=1019490
- https://bugzilla.redhat.com/show_bug.cgi?id=1019490
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
Modified: 2024-11-21
CVE-2014-9713
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.
- DSA-3209
- DSA-3209
- [oss-security] 20150329 Re: CVE request (Debian specific): slapd: dangerous access rule in default config
- [oss-security] 20150329 Re: CVE request (Debian specific): slapd: dangerous access rule in default config
- 73217
- 73217
- USN-2742-1
- USN-2742-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761406
Modified: 2024-11-21
CVE-2015-1545
The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2015:1325
- openSUSE-SU-2015:1325
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 62787
- 62787
- DSA-3209
- DSA-3209
- MDVSA-2015:073
- MDVSA-2015:073
- MDVSA-2015:074
- MDVSA-2015:074
- http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c
- http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=c32e74763f77675b9e144126e375977ed6dc562c
- http://www.openldap.org/its/?findid=8027
- http://www.openldap.org/its/?findid=8027
- [oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues
- [oss-security] 20150207 Re: CVE request: two OpenLDAP DoS issues
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- 72519
- 72519
- 1032399
- 1032399
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776988
- openldap-cve20151545-dos(100937)
- openldap-cve20151545-dos(100937)
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
Modified: 2024-11-21
CVE-2015-6908
The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
- APPLE-SA-2015-12-08-3
- SUSE-SU-2016:0224
- openSUSE-SU-2016:0226
- openSUSE-SU-2016:0255
- openSUSE-SU-2016:0261
- SUSE-SU-2016:0262
- RHSA-2015:1840
- DSA-3356
- http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629
- http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf
- 76714
- 1033534
- USN-2742-1
- https://support.apple.com/HT205637
- APPLE-SA-2015-12-08-3
- https://support.apple.com/HT205637
- USN-2742-1
- 1033534
- 76714
- http://www.security-assessment.com/files/documents/advisory/OpenLDAP-ber_get_next-Denial-of-Service.pdf
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240
- http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commit%3Bh=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629
- DSA-3356
- RHSA-2015:1840
- SUSE-SU-2016:0262
- openSUSE-SU-2016:0261
- openSUSE-SU-2016:0255
- openSUSE-SU-2016:0226
- SUSE-SU-2016:0224
Closed bugs
Надо обновить или пересобрать.
Closed vulnerabilities
BDU:2015-01984
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04296
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04297
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04298
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04299
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04300
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-04301
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07299
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09203
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09675
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09790
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2002-2443
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637
- FEDORA-2013-8212
- FEDORA-2013-8212
- FEDORA-2013-8219
- FEDORA-2013-8219
- FEDORA-2013-8113
- FEDORA-2013-8113
- openSUSE-SU-2013:1119
- openSUSE-SU-2013:1119
- openSUSE-SU-2013:1122
- openSUSE-SU-2013:1122
- RHSA-2013:0942
- RHSA-2013:0942
- DSA-2701
- DSA-2701
- MDVSA-2013:166
- MDVSA-2013:166
- USN-2810-1
- USN-2810-1
- https://bugzilla.redhat.com/show_bug.cgi?id=962531
- https://bugzilla.redhat.com/show_bug.cgi?id=962531
- https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
- https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
Modified: 2024-11-21
CVE-2013-1417
do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.
- openSUSE-SU-2013:1833
- openSUSE-SU-2013:1833
- http://web.mit.edu/kerberos/krb5-1.11/README-1.11.4.txt
- http://web.mit.edu/kerberos/krb5-1.11/README-1.11.4.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=1030743
- https://bugzilla.redhat.com/show_bug.cgi?id=1030743
- https://github.com/krb5/krb5/commit/4c023ba43c16396f0d199e2df1cfa59b88b62acc
- https://github.com/krb5/krb5/commit/4c023ba43c16396f0d199e2df1cfa59b88b62acc
Modified: 2024-11-21
CVE-2014-4341
MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
- FEDORA-2014-8189
- FEDORA-2014-8189
- RHSA-2015:0439
- RHSA-2015:0439
- 59102
- 59102
- 60082
- 60082
- 60448
- 60448
- GLSA-201412-53
- GLSA-201412-53
- DSA-3000
- DSA-3000
- MDVSA-2014:165
- MDVSA-2014:165
- 68909
- 68909
- 1030706
- 1030706
- mit-kerberos-cve20144341-dos(94904)
- mit-kerberos-cve20144341-dos(94904)
- https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
- https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
Modified: 2024-11-21
CVE-2014-4342
MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
- RHSA-2015:0439
- RHSA-2015:0439
- 59102
- 59102
- 60082
- 60082
- DSA-3000
- DSA-3000
- MDVSA-2014:165
- MDVSA-2014:165
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 68908
- 68908
- 1030706
- 1030706
- mit-kerberos-cve20144342-dos(94903)
- mit-kerberos-cve20144342-dos(94903)
- https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
- https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
Modified: 2024-11-21
CVE-2014-4343
Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969
- FEDORA-2014-8189
- FEDORA-2014-8189
- RHSA-2015:0439
- RHSA-2015:0439
- 59102
- 59102
- 60082
- 60082
- 60448
- 60448
- 61052
- 61052
- GLSA-201412-53
- GLSA-201412-53
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html
- DSA-3000
- DSA-3000
- 109390
- 109390
- 69159
- 69159
- 1030706
- 1030706
- https://bugzilla.redhat.com/show_bug.cgi?id=1121876
- https://bugzilla.redhat.com/show_bug.cgi?id=1121876
- kerberos-cve20144343-dos(95211)
- kerberos-cve20144343-dos(95211)
- https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
- https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
Modified: 2024-11-21
CVE-2014-4344
The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970
- FEDORA-2014-8189
- FEDORA-2014-8189
- RHSA-2015:0439
- RHSA-2015:0439
- 59102
- 59102
- 60082
- 60082
- 60448
- 60448
- 61051
- 61051
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html
- DSA-3000
- DSA-3000
- MDVSA-2014:165
- MDVSA-2014:165
- 109389
- 109389
- 69160
- 69160
- 1030706
- 1030706
- https://bugzilla.redhat.com/show_bug.cgi?id=1121877
- https://bugzilla.redhat.com/show_bug.cgi?id=1121877
- kerberos-cve20144344-dos(95210)
- kerberos-cve20144344-dos(95210)
- https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b
- https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b
- https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc
- https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc
Modified: 2024-11-21
CVE-2014-4345
Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://advisories.mageia.org/MGASA-2014-0345.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980
- http://linux.oracle.com/errata/ELSA-2014-1255.html
- http://linux.oracle.com/errata/ELSA-2014-1255.html
- FEDORA-2014-9315
- FEDORA-2014-9315
- FEDORA-2014-9305
- FEDORA-2014-9305
- SUSE-SU-2014:1028
- SUSE-SU-2014:1028
- openSUSE-SU-2014:1043
- openSUSE-SU-2014:1043
- RHSA-2014:1255
- RHSA-2014:1255
- RHSA-2015:0439
- RHSA-2015:0439
- 59102
- 59102
- 59415
- 59415
- 59993
- 59993
- 60535
- 60535
- 60776
- 60776
- 61314
- 61314
- 61353
- 61353
- GLSA-201412-53
- GLSA-201412-53
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt
- DSA-3000
- DSA-3000
- MDVSA-2014:165
- MDVSA-2014:165
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 109908
- 109908
- 69168
- 69168
- 1030705
- 1030705
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors
- https://bugzilla.redhat.com/show_bug.cgi?id=1128157
- https://bugzilla.redhat.com/show_bug.cgi?id=1128157
- kerberos-cve20144345-bo(95212)
- kerberos-cve20144345-bo(95212)
- https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1
- https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1
- https://github.com/krb5/krb5/pull/181
- https://github.com/krb5/krb5/pull/181
Modified: 2024-11-21
CVE-2014-5351
The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
- http://advisories.mageia.org/MGASA-2014-0477.html
- http://advisories.mageia.org/MGASA-2014-0477.html
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
- FEDORA-2014-11940
- FEDORA-2014-11940
- FEDORA-2015-2382
- FEDORA-2015-2382
- SUSE-SU-2015:0290
- SUSE-SU-2015:0290
- openSUSE-SU-2015:0255
- openSUSE-SU-2015:0255
- GLSA-201412-53
- GLSA-201412-53
- MDVSA-2014:224
- MDVSA-2014:224
- 70380
- 70380
- 1031003
- 1031003
- USN-2498-1
- USN-2498-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1145425
- https://bugzilla.redhat.com/show_bug.cgi?id=1145425
- kerberos-cve20145351-sec-bypass(97028)
- kerberos-cve20145351-sec-bypass(97028)
- https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
- https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
- [debian-lts-announce] 20180131 [SECURITY] [DLA 1265-1] krb5 security update
- [debian-lts-announce] 20180131 [SECURITY] [DLA 1265-1] krb5 security update
Modified: 2024-11-21
CVE-2014-5352
The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
- FEDORA-2015-2382
- FEDORA-2015-2382
- FEDORA-2015-2347
- FEDORA-2015-2347
- SUSE-SU-2015:0257
- SUSE-SU-2015:0257
- SUSE-SU-2015:0290
- SUSE-SU-2015:0290
- openSUSE-SU-2015:0255
- openSUSE-SU-2015:0255
- RHSA-2015:0439
- RHSA-2015:0439
- RHSA-2015:0794
- RHSA-2015:0794
- http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt
- http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
- DSA-3153
- DSA-3153
- MDVSA-2015:069
- MDVSA-2015:069
- 72495
- 72495
- USN-2498-1
- USN-2498-1
- https://github.com/krb5/krb5/commit/82dc33da50338ac84c7b4102dc6513d897d0506a
- https://github.com/krb5/krb5/commit/82dc33da50338ac84c7b4102dc6513d897d0506a
Modified: 2024-11-21
CVE-2014-5353
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
- http://advisories.mageia.org/MGASA-2014-0536.html
- http://advisories.mageia.org/MGASA-2014-0536.html
- FEDORA-2015-5949
- FEDORA-2015-5949
- openSUSE-SU-2015:0542
- openSUSE-SU-2015:0542
- RHSA-2015:0439
- RHSA-2015:0439
- RHSA-2015:0794
- RHSA-2015:0794
- MDVSA-2015:009
- MDVSA-2015:009
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71679
- 71679
- 1031376
- 1031376
- USN-2498-1
- USN-2498-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226
- https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3
- https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3
- [debian-lts-announce] 20180131 [SECURITY] [DLA 1265-1] krb5 security update
- [debian-lts-announce] 20180131 [SECURITY] [DLA 1265-1] krb5 security update
Modified: 2024-11-21
CVE-2014-5354
plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
Modified: 2024-11-21
CVE-2014-9421
The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
- FEDORA-2015-2382
- FEDORA-2015-2382
- FEDORA-2015-2347
- FEDORA-2015-2347
- SUSE-SU-2015:0257
- SUSE-SU-2015:0257
- SUSE-SU-2015:0290
- SUSE-SU-2015:0290
- openSUSE-SU-2015:0255
- openSUSE-SU-2015:0255
- RHSA-2015:0439
- RHSA-2015:0439
- RHSA-2015:0794
- RHSA-2015:0794
- http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt
- http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
- DSA-3153
- DSA-3153
- MDVSA-2015:069
- MDVSA-2015:069
- 72496
- 72496
- USN-2498-1
- USN-2498-1
- https://github.com/krb5/krb5/commit/a197e92349a4aa2141b5dff12e9dd44c2a2166e3
- https://github.com/krb5/krb5/commit/a197e92349a4aa2141b5dff12e9dd44c2a2166e3
Modified: 2024-11-21
CVE-2014-9422
The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
- FEDORA-2015-2382
- FEDORA-2015-2382
- FEDORA-2015-2347
- FEDORA-2015-2347
- SUSE-SU-2015:0257
- SUSE-SU-2015:0257
- SUSE-SU-2015:0290
- SUSE-SU-2015:0290
- openSUSE-SU-2015:0255
- openSUSE-SU-2015:0255
- RHSA-2015:0439
- RHSA-2015:0439
- RHSA-2015:0794
- RHSA-2015:0794
- http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt
- http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
- DSA-3153
- DSA-3153
- MDVSA-2015:069
- MDVSA-2015:069
- 72494
- 72494
- USN-2498-1
- USN-2498-1
- https://github.com/krb5/krb5/commit/6609658db0799053fbef0d7d0aa2f1fd68ef32d8
- https://github.com/krb5/krb5/commit/6609658db0799053fbef0d7d0aa2f1fd68ef32d8
Modified: 2024-11-21
CVE-2014-9423
The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
- FEDORA-2015-2382
- FEDORA-2015-2382
- FEDORA-2015-2347
- FEDORA-2015-2347
- SUSE-SU-2015:0257
- SUSE-SU-2015:0257
- SUSE-SU-2015:0290
- SUSE-SU-2015:0290
- openSUSE-SU-2015:0255
- openSUSE-SU-2015:0255
- RHSA-2015:0439
- RHSA-2015:0439
- http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt
- http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
- DSA-3153
- DSA-3153
- MDVSA-2015:069
- MDVSA-2015:069
- 72503
- 72503
- USN-2498-1
- USN-2498-1
- https://github.com/krb5/krb5/commit/5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c
- https://github.com/krb5/krb5/commit/5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c
Package cyrus-sasl2 updated to version 2.1.24-alt7.cvs.20090508.M70C.2 for branch c7 in task 150648.
Closed vulnerabilities
BDU:2015-09740
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-4122
Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference.
- http://git.cyrusimap.org/cyrus-sasl/commit/?id=dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d
- http://git.cyrusimap.org/cyrus-sasl/commit/?id=dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d
- GLSA-201309-01
- GLSA-201309-01
- DSA-3368
- DSA-3368
- [oss-security] 20130712 CVE request: Cyrus-sasl NULL ptr. dereference
- [oss-security] 20130712 CVE request: Cyrus-sasl NULL ptr. dereference
- [oss-security] 20130712 Re: CVE request: Cyrus-sasl NULL ptr. dereference
- [oss-security] 20130712 Re: CVE request: Cyrus-sasl NULL ptr. dereference
- [oss-security] 20130713 Re: CVE request: Cyrus-sasl NULL ptr. dereference
- [oss-security] 20130713 Re: CVE request: Cyrus-sasl NULL ptr. dereference
- [oss-security] 20130715 Re: CVE request: Cyrus-sasl NULL ptr. dereference
- [oss-security] 20130715 Re: CVE request: Cyrus-sasl NULL ptr. dereference
- USN-2755-1
- USN-2755-1
- https://www.linuxquestions.org/questions/slackware-14/%5Bslackware-current%5D-glibc-2-17-shadow-and-other-penumbrae-4175461061/
- https://www.linuxquestions.org/questions/slackware-14/%5Bslackware-current%5D-glibc-2-17-shadow-and-other-penumbrae-4175461061/