6.1

CVE-2014-9422

The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MitKerberos 5 Version1.11
MitKerberos 5 Version1.11.1
MitKerberos 5 Version1.11.2
MitKerberos 5 Version1.11.3
MitKerberos 5 Version1.11.4
MitKerberos 5 Version1.11.5
MitKerberos 5 Version1.12
MitKerberos 5 Version1.12.1
MitKerberos 5 Version1.12.2
MitKerberos 5 Version1.13
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.02% 0.752
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 3.9 8.5
AV:N/AC:H/Au:S/C:P/I:P/A:C
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.