CVE-2014-4344NULL Pointer Dereference in Kerberos 5

Severity
7.8HIGHNVD
EPSS
5.3%
top 9.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 14
Latest updateMay 13

Description

The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.

CVSS vector

AV:N/AC:L/C:N/I:N/A:CExploitability: 10.0 | Impact: 6.9

Affected Packages6 packages

Also affects: Debian Linux 7.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-335x-2h4v-298w: The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech2022-05-13
OSV
CVE-2014-4344: The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech2014-08-14
CVEList
CVE-2014-4344: The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech2014-08-14

📋Vendor Advisories

3
Ubuntu
Kerberos vulnerabilities2014-08-11
Red Hat
krb5: NULL pointer dereference flaw in SPNEGO acceptor for continuation tokens2014-07-15
Debian
CVE-2014-4344: krb5 - The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mec...2014

💬Community

2
Bugzilla
CVE-2014-4343 CVE-2014-4344 krb5: various flaws [fedora-all]2014-07-22
Bugzilla
CVE-2014-4344 krb5: NULL pointer dereference flaw in SPNEGO acceptor for continuation tokens2014-07-22
CVE-2014-4344 — NULL Pointer Dereference in Kerberos 5 | cvebase