Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2014-4345

CVE information

Published

9 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands..

CVSSv2.0 Score

Severity
High
Base Score
8.5/10
Exploit Score
6.8/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
Single
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
  Yes
- -

References