Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1174543 - (CVE-2014-5353) CVE-2014-5353 krb5: NULL pointer dereference when using a ticket policy name as a password policy name
CVE-2014-5353 krb5: NULL pointer dereference when using a ticket policy name ...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20141206,repor...
: Security
: 1163411 (view as bug list)
Depends On: 1174544 1174985 1205561 1205562
Blocks: 1174549 1179866
  Show dependency treegraph
 
Reported: 2014-12-15 21:37 EST by Murray McAllister
Modified: 2015-11-04 03:58 EST (History)
30 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
If kadmind were used with an LDAP back end for the KDC database, a remote, authenticated attacker who has the permissions to set the password policy could crash kadmind by attempting to use a named ticket policy object as a password policy for a principal.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-11-04 03:48:24 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0439 normal SHIPPED_LIVE Moderate: krb5 security, bug fix and enhancement update 2015-03-05 09:38:14 EST
Red Hat Product Errata RHSA-2015:0794 normal SHIPPED_LIVE Moderate: krb5 security update 2015-04-09 05:09:12 EDT

  None (edit)
Description Murray McAllister 2014-12-15 21:37:25 EST
If kadmind were used with an LDAP back end for the KDC database, a remote, authenticated attacker who has the permissions to set the password policy could crash kadmind by attempting to use a named ticket policy object as a password policy for a principal.

Upstream fix:

https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3

Reference:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226
Comment 1 Murray McAllister 2014-12-15 21:38:20 EST
Created krb5 tracking bugs for this issue:

Affects: fedora-all [bug 1174544]
Comment 4 Huzaifa S. Sidhpurwala 2014-12-19 00:08:15 EST
Statement:

This issue affects the version of krb5 package as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This issue is not planned to be addressed in Red Hat Enterprise Linux 5. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Comment 9 errata-xmlrpc 2015-03-05 05:01:31 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:0439 https://rhn.redhat.com/errata/RHSA-2015-0439.html
Comment 12 Patrik Kis 2015-04-03 05:06:49 EDT
*** Bug 1163411 has been marked as a duplicate of this bug. ***
Comment 13 errata-xmlrpc 2015-04-09 01:09:21 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2015:0794 https://rhn.redhat.com/errata/RHSA-2015-0794.html
Comment 14 Fedora Update System 2015-04-22 18:50:03 EDT
krb5-1.13.1-2.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 15 Fedora Update System 2015-06-20 20:28:42 EDT
krb5-1.12.2-17.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.