FreeBSD : krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092 (3a888a1e-b321-11e4-83b2-206a8a720317)

low Nessus Plugin ID 81331

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The MIT Kerberos team reports :

CVE-2014-5353: The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.

CVE-2014-5354: plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin 'add_principal -nokey' or 'purgekeys -all' command.

Solution

Update the affected packages.

See Also

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt

http://www.nessus.org/u?c93b0dab

Plugin Details

Severity: Low

ID: 81331

File Name: freebsd_pkg_3a888a1eb32111e483b2206a8a720317.nasl

Version: 1.6

Type: local

Published: 2/13/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 3.5

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:krb5, p-cpe:/a:freebsd:freebsd:krb5-111, p-cpe:/a:freebsd:freebsd:krb5-112, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/12/2015

Vulnerability Publication Date: 2/12/2015

Reference Information

CVE: CVE-2014-5353, CVE-2014-5354