CVE-2014-9423

EUVD-2014-9244
The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
Affected Products (NVD)
VendorProductVersion
mitkerberos_5
1.11
mitkerberos_5
1.11.1
mitkerberos_5
1.11.2
mitkerberos_5
1.11.3
mitkerberos_5
1.11.4
mitkerberos_5
1.11.5
mitkerberos_5
1.12
mitkerberos_5
1.12.1
mitkerberos_5
1.12.2
mitkerberos_5
1.13
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
krb5
bookworm
1.20.1-2+deb12u2
fixed
bookworm (security)
1.20.1-2+deb12u2
fixed
bullseye
1.18.3-6+deb11u5
fixed
bullseye (security)
1.18.3-6+deb11u5
fixed
sid
1.21.3-3
fixed
trixie
1.21.3-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
krb5
lucid
Fixed 1.8.1+dfsg-2ubuntu0.14
released
precise
Fixed 1.10+dfsg~beta1-2ubuntu0.6
released
trusty
Fixed 1.12+dfsg-2ubuntu5.1
released
utopic
Fixed 1.12.1+dfsg-10ubuntu0.1
released
References