ALT-PU-2016-1393-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-2695
lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
- SUSE-SU-2015:1897
- SUSE-SU-2015:1897
- SUSE-SU-2015:1898
- SUSE-SU-2015:1898
- openSUSE-SU-2015:1928
- openSUSE-SU-2015:1928
- openSUSE-SU-2015:1997
- openSUSE-SU-2015:1997
- DSA-3395
- DSA-3395
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 90687
- 90687
- 1034084
- 1034084
- USN-2810-1
- USN-2810-1
- https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
- https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
- GLSA-201611-14
- GLSA-201611-14
Modified: 2024-11-21
CVE-2015-2696
lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
- SUSE-SU-2015:1897
- SUSE-SU-2015:1897
- openSUSE-SU-2015:1928
- openSUSE-SU-2015:1928
- openSUSE-SU-2015:1997
- openSUSE-SU-2015:1997
- DSA-3395
- DSA-3395
- 90675
- 90675
- 1034084
- 1034084
- USN-2810-1
- USN-2810-1
- https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
- https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
- GLSA-201611-14
- GLSA-201611-14
Modified: 2024-11-21
CVE-2015-2697
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
- SUSE-SU-2015:1897
- SUSE-SU-2015:1897
- openSUSE-SU-2015:1928
- openSUSE-SU-2015:1928
- openSUSE-SU-2015:1997
- openSUSE-SU-2015:1997
- DSA-3395
- DSA-3395
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 77581
- 77581
- 1034084
- 1034084
- USN-2810-1
- USN-2810-1
- https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
- https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
- GLSA-201611-14
- GLSA-201611-14
Modified: 2024-11-21
CVE-2015-2698
The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspecified other impact by interacting with an application that calls the gss_export_sec_context function. NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-2696.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8273
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8273
- openSUSE-SU-2015:2055
- openSUSE-SU-2015:2055
- openSUSE-SU-2015:2376
- openSUSE-SU-2015:2376
- USN-2810-1
- USN-2810-1
- https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd
- https://github.com/krb5/krb5/commit/3db8dfec1ef50ddd78d6ba9503185995876a39fd
Modified: 2024-11-21
CVE-2015-8629
The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
- openSUSE-SU-2016:0406
- openSUSE-SU-2016:0406
- openSUSE-SU-2016:0501
- openSUSE-SU-2016:0501
- RHSA-2016:0493
- RHSA-2016:0493
- RHSA-2016:0532
- RHSA-2016:0532
- DSA-3466
- DSA-3466
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 82801
- 82801
- 1034914
- 1034914
- https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
- https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
Modified: 2024-11-21
CVE-2015-8630
The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342
- openSUSE-SU-2016:0406
- openSUSE-SU-2016:0406
- openSUSE-SU-2016:0501
- openSUSE-SU-2016:0501
- RHSA-2016:0532
- RHSA-2016:0532
- DSA-3466
- DSA-3466
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 1034915
- 1034915
- https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
- https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b
Modified: 2024-11-21
CVE-2015-8631
Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
- openSUSE-SU-2016:0406
- openSUSE-SU-2016:0406
- openSUSE-SU-2016:0501
- openSUSE-SU-2016:0501
- RHSA-2016:0493
- RHSA-2016:0493
- RHSA-2016:0532
- RHSA-2016:0532
- DSA-3466
- DSA-3466
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 1034916
- 1034916
- https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
- https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
Modified: 2024-11-21
CVE-2016-3119
The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
- openSUSE-SU-2016:0947
- openSUSE-SU-2016:0947
- openSUSE-SU-2016:1072
- openSUSE-SU-2016:1072
- RHSA-2016:2591
- RHSA-2016:2591
- 85392
- 85392
- 1035399
- 1035399
- https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
- https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
- [debian-lts-announce] 20180131 [SECURITY] [DLA 1265-1] krb5 security update
- [debian-lts-announce] 20180131 [SECURITY] [DLA 1265-1] krb5 security update