First published: Thu Feb 19 2015(Updated: )
The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | =1.11 | |
MIT Kerberos 5 | =1.11.1 | |
MIT Kerberos 5 | =1.11.2 | |
MIT Kerberos 5 | =1.11.3 | |
MIT Kerberos 5 | =1.11.4 | |
MIT Kerberos 5 | =1.11.5 | |
MIT Kerberos 5 | =1.12 | |
MIT Kerberos 5 | =1.12.1 | |
MIT Kerberos 5 | =1.12.2 | |
MIT Kerberos 5 | =1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9423 has a medium severity rating as it allows remote attackers to obtain sensitive information.
To fix CVE-2014-9423, upgrade to MIT Kerberos 5 version 1.13.1 or later.
Versions 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 are affected by CVE-2014-9423.
CVE-2014-9423 transmits uninitialized interposer data to clients, leading to potential data leaks.
There is no specific workaround; the recommended action is to upgrade to a patched version of MIT Kerberos.