First published: Tue Jul 22 2014(Updated: )
A double-free flaw was found in the MIT Kerberos SPNEGO initiators. An attacker able to spoof packets to appear as though they are from an GSSAPI acceptor could use this flaw to crash a client application that uses MIT Kerberos. It is reported that this issue affects version 1.10 and later. Upstream commit and further details: <a href="https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f">https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =7.0 | |
Kerberos 5 (libkrb5) | =1.10 | |
Kerberos 5 (libkrb5) | =1.10.1 | |
Kerberos 5 (libkrb5) | =1.10.2 | |
Kerberos 5 (libkrb5) | =1.10.3 | |
Kerberos 5 (libkrb5) | =1.10.4 | |
Kerberos 5 (libkrb5) | =1.11 | |
Kerberos 5 (libkrb5) | =1.11.1 | |
Kerberos 5 (libkrb5) | =1.11.2 | |
Kerberos 5 (libkrb5) | =1.11.3 | |
Kerberos 5 (libkrb5) | =1.11.4 | |
Kerberos 5 (libkrb5) | =1.11.5 | |
Kerberos 5 (libkrb5) | =1.12 | |
Kerberos 5 (libkrb5) | =1.12.1 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4343 is classified as a medium severity vulnerability due to its potential to cause application crashes.
To fix CVE-2014-4343, upgrade your MIT Kerberos 5 implementation to version 1.12.1 or later.
CVE-2014-4343 affects MIT Kerberos 5 versions 1.10 and later, including various versions up to 1.12.
CVE-2014-4343 can cause crashes in client applications that use MIT Kerberos when the flawed function is invoked.
There is no reliable workaround for CVE-2014-4343; updating to an unimpacted version is the recommended solution.