First published: Tue Jul 22 2014(Updated: )
A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO acceptor for continuation tokens. An unauthenticated attacker could use this flaw to crash the server acceptor. It is reported that this issue affects version 1.5 and later. Upstream commit and further details: <a href="https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b">https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =7.0 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Kerberos 5 (libkrb5) | =1.10 | |
Kerberos 5 (libkrb5) | =1.10.1 | |
Kerberos 5 (libkrb5) | =1.10.2 | |
Kerberos 5 (libkrb5) | =1.10.3 | |
Kerberos 5 (libkrb5) | =1.10.4 | |
Kerberos 5 (libkrb5) | =1.11 | |
Kerberos 5 (libkrb5) | =1.11.1 | |
Kerberos 5 (libkrb5) | =1.11.2 | |
Kerberos 5 (libkrb5) | =1.11.3 | |
Kerberos 5 (libkrb5) | =1.11.4 | |
Kerberos 5 (libkrb5) | =1.11.5 | |
Kerberos 5 (libkrb5) | =1.12 | |
Kerberos 5 (libkrb5) | =1.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4344 has a medium severity rating, as it allows an unauthenticated attacker to crash the server acceptor.
To fix CVE-2014-4344, you should upgrade to the patched version of MIT Kerberos 5 or apply the relevant security patches provided by your operating system vendor.
CVE-2014-4344 affects all versions of MIT Kerberos 5 starting from 1.5 and later.
The impact of CVE-2014-4344 is that an attacker can exploit the NULL pointer dereference flaw to crash the server acceptor, leading to a denial of service.
CVE-2014-4344 impacts Debian GNU/Linux 7.0 and several versions of Red Hat Enterprise Linux, including server, desktop, HPC node, and workstation.