Unrated severityNVD Advisory· Published Feb 20, 2015· Updated May 6, 2026
CVE-2014-5355
CVE-2014-5355
Description
MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
Affected products
83cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*+ 59 more
- cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
- osv-coords23 versionspkg:rpm/opensuse/krb5&distro=openSUSE%20Tumbleweedpkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/krb5-doc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/krb5-doc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/krb5-doc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/krb5-doc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/krb5-doc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/krb5-plugins&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/krb5-plugins&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/krb5-plugins&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/krb5-plugins&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/krb5-plugins&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4
< 1.15-1.1+ 22 more
- (no CPE)range: < 1.15-1.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.12.1-16.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.12.1-16.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.12.1-16.1
- (no CPE)range: < 1.6.3-133.49.68.2
- (no CPE)range: < 1.6.3-133.49.68.2
- (no CPE)range: < 1.6.3-133.49.68.2
- (no CPE)range: < 1.6.3-133.49.68.2
- (no CPE)range: < 1.6.3-133.49.68.2
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
- (no CPE)range: < 1.6.3-133.49.68.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- krbdev.mit.edu/rt/Ticket/Display.htmlnvdVendor Advisory
- lists.opensuse.org/opensuse-updates/2015-03/msg00061.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-0794.htmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlnvd
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvd
- www.securityfocus.com/bid/74042nvd
- www.ubuntu.com/usn/USN-2810-1nvd
- github.com/krb5/krb5/commit/102bb6ebf20f9174130c85c3b052ae104e5073ecnvd
- lists.debian.org/debian-lts-announce/2018/01/msg00040.htmlnvd
News mentions
0No linked articles in our index yet.