FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
406636fe-055d-11e5-aab1-d050996490d0krb5 -- requires_preauth bypass in PKINIT-enabled KDC

MIT reports:

In MIT krb5 1.12 and later, when the KDC is configured with PKINIT support, an unauthenticated remote attacker can bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal's long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user's password.


Discovery 2015-05-25
Entry 2015-05-28
krb5
< 1.13.2

krb5-112
< 1.12.3_2

CVE-2015-2694
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8160
24ce5597-acab-11e4-a847-206a8a720317krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092

SO-AND-SO reports:

CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library, after gss_process_context_token() is used to process a valid context deletion token, the caller is left with a security context handle containing a dangling pointer. Further uses of this handle will result in use-after-free and double-free memory access violations. libgssrpc server applications such as kadmind are vulnerable as they can be instructed to call gss_process_context_token().

CVE-2014-9421: If the MIT krb5 kadmind daemon receives invalid XDR data from an authenticated user, it may perform use-after-free and double-free memory access violations while cleaning up the partial deserialization results. Other libgssrpc server applications may also be vulnerable if they contain insufficiently defensive XDR functions.

CVE-2014-9422: The MIT krb5 kadmind daemon incorrectly accepts authentications to two-component server principals whose first component is a left substring of "kadmin" or whose realm is a left prefix of the default realm.

CVE-2014-9423: libgssrpc applications including kadmind output four or eight bytes of uninitialized memory to the network as part of an unused "handle" field in replies to clients.


Discovery 2015-02-03
Entry 2015-02-04
krb5
< 1.13_1

krb5-112
< 1.12.2_1

krb5-111
< 1.11.5_4

CVE-2014-5352
CVE-2014-9421
CVE-2014-9422
CVE-2014-9423
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
3a888a1e-b321-11e4-83b2-206a8a720317krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092

The MIT Kerberos team reports:

CVE-2014-5353: The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.

CVE-2014-5354: plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.


Discovery 2015-02-12
Entry 2015-02-12
Modified 2015-02-13
krb5
< 1.13.1

krb5-112
< 1.12.2_2

krb5-111
< 1.11.5_5

CVE-2014-5353
CVE-2014-5354
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt
63527d0d-b9de-11e4-8a48-206a8a720317krb5 1.12 -- New release/fix multiple vulnerabilities

The MIT Kerberos team announces the availability of MIT Kerberos 5 Release 1.12.3:

Fix multiple vulnerabilities in the LDAP KDC back end. [CVE-2014-5354] [CVE-2014-5353]

Fix multiple kadmind vulnerabilities, some of which are based in the gssrpc library. [CVE-2014-5352 CVE-2014-5352 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423]


Discovery 2015-02-20
Entry 2015-02-21
krb5-112
< 1.12.3

http://web.mit.edu/kerberos/krb5-1.12/README-1.12.3.txt