Lucene search

K
gentooGentoo FoundationGLSA-201412-53
HistoryDec 31, 2014 - 12:00 a.m.

MIT Kerberos 5: User-assisted execution of arbitrary code

2014-12-3100:00:00
Gentoo Foundation
security.gentoo.org
18

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.047

Percentile

92.7%

Background

MIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol.

Description

Multiple vulnerabilities have been discovered in MIT Kerberos 5. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could execute arbitrary code with the privileges of the process or cause Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All MIT Kerberos 5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.13"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-crypt/mit-krb5< 1.13UNKNOWN

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.047

Percentile

92.7%