FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-29 07:54:42 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
3a888a1e-b321-11e4-83b2-206a8a720317krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092

The MIT Kerberos team reports:

CVE-2014-5353: The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.

CVE-2014-5354: plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.


Discovery 2015-02-12
Entry 2015-02-12
Modified 2015-02-13
krb5
< 1.13.1

krb5-112
< 1.12.2_2

krb5-111
< 1.11.5_5

CVE-2014-5353
CVE-2014-5354
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
63527d0d-b9de-11e4-8a48-206a8a720317krb5 1.12 -- New release/fix multiple vulnerabilities

The MIT Kerberos team announces the availability of MIT Kerberos 5 Release 1.12.3:

Fix multiple vulnerabilities in the LDAP KDC back end. [CVE-2014-5354] [CVE-2014-5353]

Fix multiple kadmind vulnerabilities, some of which are based in the gssrpc library. [CVE-2014-5352 CVE-2014-5352 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423]


Discovery 2015-02-20
Entry 2015-02-21
krb5-112
< 1.12.3

http://web.mit.edu/kerberos/krb5-1.12/README-1.12.3.txt
406636fe-055d-11e5-aab1-d050996490d0krb5 -- requires_preauth bypass in PKINIT-enabled KDC

MIT reports:

In MIT krb5 1.12 and later, when the KDC is configured with PKINIT support, an unauthenticated remote attacker can bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal's long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user's password.


Discovery 2015-05-25
Entry 2015-05-28
krb5
< 1.13.2

krb5-112
< 1.12.3_2

CVE-2015-2694
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8160