Vulnerability Description
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mit | Kerberos 5 | < 1.13.1 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Eus | 6.6 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 6.6 |
| Redhat | Enterprise Linux Server Tus | 6.6 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Fedoraproject | Fedora | 22 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 10.04 |
| Oracle | Solaris | 10 |
| Opensuse | Opensuse | 13.1 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0536.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-0439.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-0794.htmlThird Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:009Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.htmlThird Party Advisory
- http://www.securityfocus.com/bid/71679Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1031376Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2498-1Third Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226Issue TrackingMailing ListThird Party Advisory
- https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/01/msg00040.htmlMailing ListThird Party Advisory
- http://advisories.mageia.org/MGASA-2014-0536.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.htmlThird Party Advisory
FAQ
What is CVE-2014-5353?
CVE-2014-5353 is a vulnerability with a CVSS score of 3.5 (LOW). The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated use...
How severe is CVE-2014-5353?
CVE-2014-5353 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-5353?
Check the references section above for vendor advisories and patch information. Affected products include: Mit Kerberos 5, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.