Description
The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-146-1 | krb5 security update |
Debian DSA |
DSA-3153-1 | krb5 security update |
EUVD |
EUVD-2014-9244 | The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field. |
Ubuntu USN |
USN-2498-1 | Kerberos vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:47:41.334Z
Reserved: 2014-12-26T00:00:00.000Z
Link: CVE-2014-9423
No data.
Status : Modified
Published: 2015-02-19T11:59:07.500
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-9423
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN