VYPR

rpm package

suse/krb5&distro=SUSE Linux Enterprise Server 12

pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2012

Vulnerabilities (17)

  • CVE-2016-3119MedMar 26, 2016
    affected < 1.12.1-28.1fixed 1.12.1-28.1

    The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service

  • CVE-2015-8631MedFeb 13, 2016
    affected < 1.12.1-25.1fixed 1.12.1-25.1

    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.

  • CVE-2015-8630HigFeb 13, 2016
    affected < 1.12.1-25.1fixed 1.12.1-25.1

    The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer

  • CVE-2015-8629MedFeb 13, 2016
    affected < 1.12.1-25.1fixed 1.12.1-25.1

    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a den

  • CVE-2015-2698Nov 13, 2015
    affected < 1.12.1-22.5fixed 1.12.1-22.5

    The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspeci

  • CVE-2015-2697Nov 9, 2015
    affected < 1.12.1-19.1fixed 1.12.1-19.1

    The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

  • CVE-2015-2696Nov 9, 2015
    affected < 1.12.1-19.1fixed 1.12.1-19.1

    lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_c

  • CVE-2015-2695Nov 9, 2015
    affected < 1.12.1-19.1fixed 1.12.1-19.1

    lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_in

  • CVE-2015-2694May 25, 2015
    affected < 1.12.1-16.1fixed 1.12.1-16.1

    The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an

  • CVE-2014-5355Feb 20, 2015
    affected < 1.12.1-16.1fixed 1.12.1-16.1

    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2

  • CVE-2014-9423Feb 19, 2015
    affected < 1.12.1-9.1fixed 1.12.1-9.1

    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive informat

  • CVE-2014-9422Feb 19, 2015
    affected < 1.12.1-9.1fixed 1.12.1-9.1

    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by le

  • CVE-2014-9421Feb 19, 2015
    affected < 1.12.1-9.1fixed 1.12.1-9.1

    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of servi

  • CVE-2014-5352Feb 19, 2015
    affected < 1.12.1-9.1fixed 1.12.1-9.1

    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remo

  • CVE-2014-5354Dec 16, 2014
    affected < 1.12.1-16.1fixed 1.12.1-16.1

    plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyle

  • CVE-2014-5353Dec 16, 2014
    affected < 1.12.1-16.1fixed 1.12.1-16.1

    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with

  • CVE-2014-5351Oct 10, 2014
    affected < 1.12.1-9.1fixed 1.12.1-9.1

    The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.