First published: Tue Jul 22 2014(Updated: )
A double-free flaw was found in the MIT Kerberos SPNEGO initiators. An attacker able to spoof packets to appear as though they are from an GSSAPI acceptor could use this flaw to crash a client application that uses MIT Kerberos. It is reported that this issue affects version 1.10 and later. Upstream commit and further details: <a href="https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f">https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
MIT Kerberos 5 | =1.10 | |
MIT Kerberos 5 | =1.10.1 | |
MIT Kerberos 5 | =1.10.2 | |
MIT Kerberos 5 | =1.10.3 | |
MIT Kerberos 5 | =1.10.4 | |
MIT Kerberos 5 | =1.11 | |
MIT Kerberos 5 | =1.11.1 | |
MIT Kerberos 5 | =1.11.2 | |
MIT Kerberos 5 | =1.11.3 | |
MIT Kerberos 5 | =1.11.4 | |
MIT Kerberos 5 | =1.11.5 | |
MIT Kerberos 5 | =1.12 | |
MIT Kerberos 5 | =1.12.1 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Hpc Node | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.