3.5
CVSSv2

CVE-2014-5354

Published: 16/12/2014 Updated: 21/01/2020
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P

Vulnerability Summary

plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x prior to 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5_1.13

mit kerberos 5 1.12.1

mit kerberos 5 1.12

mit kerberos 5 1.12.2

Vendor Advisories

Several security issues were fixed in Kerberos ...
Debian Bug report logs - #773226 CVE-2014-5353: misused policy name crashes KDC Package: krb5-kdc-ldap; Maintainer for krb5-kdc-ldap is Sam Hartman <hartmans@debianorg>; Source for krb5-kdc-ldap is src:krb5 (PTS, buildd, popcon) Reported by: Benjamin Kaduk <kaduk@MITEDU> Date: Mon, 15 Dec 2014 20:09:06 UTC Severit ...
Debian Bug report logs - #773228 CVE-2014-5354: kadmin crashes on keyless principals Package: krb5-kdc-ldap; Maintainer for krb5-kdc-ldap is Sam Hartman <hartmans@debianorg>; Source for krb5-kdc-ldap is src:krb5 (PTS, buildd, popcon) Reported by: Benjamin Kaduk <kaduk@MITEDU> Date: Mon, 15 Dec 2014 20:09:17 UTC Se ...