LOW · 3.5

CVE-2014-5353

The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated use...

Vulnerability Description

The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.

CVSS Score

3.5

LOW

AV:N/AC:M/Au:S/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
MitKerberos 5< 1.13.1
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Eus6.6
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Aus6.6
RedhatEnterprise Linux Server Tus6.6
RedhatEnterprise Linux Workstation6.0
FedoraprojectFedora22
DebianDebian Linux7.0
CanonicalUbuntu Linux10.04
OracleSolaris10
OpensuseOpensuse13.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-5353?

CVE-2014-5353 is a vulnerability with a CVSS score of 3.5 (LOW). The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated use...

How severe is CVE-2014-5353?

CVE-2014-5353 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-5353?

Check the references section above for vendor advisories and patch information. Affected products include: Mit Kerberos 5, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.