Description
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
CVSS Metrics
- Vector
- AV:N/AC:M/Au:S/C:N/I:N/A:P
- Access Vector
- network
- Access Cmplx
- medium
- Auth
- single
- Confidentiality
- none
- Integrity
- none
- Availability
- partial
- Weaknesses
- CWE-476
Metadata
- Primary Vendor
- MIT
- Published
- 12/16/2014
- Last Modified
- 4/12/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
mit : kerberos_5redhat : enterprise_linux_desktopredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_serverredhat : enterprise_linux_serverredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_tusredhat : enterprise_linux_server_tusredhat : enterprise_linux_workstationfedoraproject : fedoradebian : debian_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxoracle : solarisoracle : solarisopensuse : opensuseopensuse : opensuse
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.