6.1
CVSSv2

CVE-2014-9422

Published: 19/02/2015 Updated: 21/01/2020
CVSS v2 Base Score: 6.1 | Impact Score: 8.5 | Exploitability Score: 3.9
VMScore: 544
Vector: AV:N/AC:H/Au:S/C:P/I:P/A:C

Vulnerability Summary

The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) up to and including 1.11.5, 1.12.x up to and including 1.12.2, and 1.13.x prior to 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 1.11.5

mit kerberos 5 1.12

mit kerberos 5 1.11.3

mit kerberos 5 1.11.4

mit kerberos 5 1.11.1

mit kerberos 5 1.11.2

mit kerberos 5 1.13

mit kerberos 5 1.11

mit kerberos 5 1.12.1

mit kerberos 5 1.12.2

Vendor Advisories

Several security issues were fixed in Kerberos ...
A use-after-free flaw was found in the way the MIT Kerberos libgssapi_krb5 library processed valid context deletion tokens An attacker able to make an application using the GSS-API library (libgssapi) could call the gss_process_context_token() function and use this flaw to crash that application (CVE-2014-5352) If kadmind were used with an LDAP b ...
It was found that the MIT Kerberos administration server (kadmind) incorrectly accepted certain authentication requests for two-component server principal names A remote attacker able to acquire a key with a particularly named principal (such as "kad/x") could use this flaw to impersonate any user to kadmind, and perform administrative actions as ...