PureEngage On-Premises

 View Only

Sign Up

krb5 multiple security issues - does this affect Genesys products?

  • 1.  krb5 multiple security issues - does this affect Genesys products?

    Posted 10-17-2014 21:00
    There are 7 CVE's (CVSS range from medium to high) which list issues with krb5 security. Do any of these affect the Genesys products?

    CVE-2013-1418, CVE-2013-6800
    It was found that if a KDC served multiple realms, certain requests could cause the setup_server_realm() function to dereference a NULL pointer.
    A remote, unauthenticated attacker could use this flaw to crash the KDC using a specially crafted request.
    CVE-2013-1418
    CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:N/A:P) (legend)
    Impact Subscore: 2.9
    Exploitability Subscore: 8.6
    CVSS Version 2 Metrics:
    Access Vector: Network exploitable
    Access Complexity: Medium
    Authentication: Not required to exploit
    Impact Type: Allows disruption of service

    CVE-2013-6800
    CVSS v2 Base Score: 4.0 (MEDIUM) (AV:N/AC:L/Au:S/C:N/I:N/A:P) (legend)
    Impact Subscore: 2.9
    Exploitability Subscore: 8.0
    CVSS Version 2 Metrics:
    Access Vector: Network exploitable
    Access Complexity: Low
    Authentication: Required to exploit
    Impact Type: Allows disruption of service

    CVE-2014-4341, CVE-2014-4342
    Two buffer over-read flaws were found in the way MIT Kerberos handled certain requests. A remote, unauthenticated attacker who is able to inject packets into a client or

    server application's GSSAPI session could use either of these flaws to crash the application.
    CVE-2014-4341
    CVSS v2 Base Score: 5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
    Impact Subscore: 2.9
    Exploitability Subscore: 10.0
    CVSS Version 2 Metrics:
    Access Vector: Network exploitable
    Access Complexity: Low
    Authentication: Not required to exploit
    Impact Type: Allows disruption of service

    CVE-2014-4342
    CVSS v2 Base Score: 5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
    Impact Subscore: 2.9
    Exploitability Subscore: 10.0
    CVSS Version 2 Metrics:
    Access Vector: Network exploitable
    Access Complexity: Low
    Authentication: Not required to exploit
    Impact Type: Allows disruption of service

    CVE-2014-4343
    A double-free flaw was found in the MIT Kerberos SPNEGO initiators. An attacker able to spoof packets to appear as though they are from an GSSAPI acceptor could use this flaw

    to crash a client application that uses MIT Kerberos.
    CVSS v2 Base Score: 7.6 (HIGH) (AV:N/AC:H/Au:N/C:C/I:C/A:C) (legend)
    Impact Subscore: 10.0
    Exploitability Subscore: 4.9
    CVSS Version 2 Metrics:
    Access Vector: Network exploitable
    Access Complexity: High
    Authentication: Not required to exploit
    Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

    CVE-2014-4344
    A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO acceptor for continuation tokens. A remote, unauthenticated attacker could use this flaw to crash a

    GSSAPI-enabled server application.
    CVSS v2 Base Score: 7.8 (HIGH) (AV:N/AC:L/Au:N/C:N/I:N/A:C) (legend)
    Impact Subscore: 6.9
    Exploitability Subscore: 10.0
    Access Vector: Network exploitable
    Access Complexity: Low
    Authentication: Not required to exploit
    Impact Type: Allows disruption of service

    CVE-2014-4345
    A buffer overflow was found in the KADM5 administration server (kadmind) when it was used with an LDAP back end for the KDC database. A remote, authenticated attacker could

    potentially use this flaw to execute arbitrary code on the system running kadmind.
    CVSS v2 Base Score: 8.5 (HIGH) (AV:N/AC:M/Au:S/C:C/I:C/A:C) (legend)
    Impact Subscore: 10.0
    Exploitability Subscore: 6.8
    CVSS Version 2 Metrics:
    Access Vector: Network exploitable
    Access Complexity: Medium
    Authentication: Required to exploit
    Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service