First published: Mon Dec 15 2014(Updated: )
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/krb5 | <=1.8.3+dfsg-4squeeze7<=1.8.3+dfsg-4 | |
debian/krb5 | 1.18.3-6+deb11u4 1.18.3-6+deb11u5 1.20.1-2+deb12u1 1.20.1-2+deb12u2 1.21.3-3 | |
Kerberos | <1.13.1 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.6 | |
Red Hat Enterprise Linux Server EUS | =7.3 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Fedora | =22 | |
Debian | =7.0 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Oracle Solaris and Zettabyte File System (ZFS) | =10 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5353 is classified as a denial of service vulnerability that allows remote authenticated users to crash the KDC when it utilizes LDAP.
To mitigate CVE-2014-5353, upgrade to versions krb5 1.13.1 or later, or to the specified patched versions from your distribution.
CVE-2014-5353 affects MIT Kerberos 5 versions before 1.13.1.
Yes, CVE-2014-5353 can be exploited by remote authenticated users through specially crafted LDAP queries.
Affected systems include various Linux distributions using MIT Kerberos 5 versions prior to 1.13.1.