MGASA-2015-0119

Source
https://advisories.mageia.org/MGASA-2015-0119.html
Import Source
https://advisories.mageia.org/MGASA-2015-0119.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0119
Related
Published
2015-03-27T21:12:10Z
Modified
2015-07-09T07:56:53Z
Summary
Updated krb5 package fixes security vulnerability
Details

MIT Kerberos 5 through 1.13.1 incorrectly expects that a krb5readmessage data field is represented as a string ending with a '\0' character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a zero-byte version string or cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c (CVE-2014-5355).

References
Credits

Affected packages

Mageia:4 / krb5

Package

Name
krb5
Purl
pkg:rpm/mageia/krb5?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.4-1.5.mga4

Ecosystem specific

{
    "section": "core"
}