Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-5352

EPSS 5.41% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-5352

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
MIT krb5 libgssapi_krb5库远程代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MIT Kerberos 5(又名krb5)是美国麻省理工学院(MIT)开发的一套网络认证协议,它采用客户端/服务器结构,并且客户端和服务器端均可对对方进行身份认证(即双重验证),可防止窃听、防止replay攻击等。 MIT Kerberos 5的libgssapi_krb5库中的lib/gssapi/krb5/process_context_token.c文件中的‘krb5_gss_process_context_token’函数存在安全漏洞,该漏洞源于程序没有正确处理security-context。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-5352

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-5352

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-02-19 · 32 CVEs total

CVE-2015-1614WordPress Image Metadata Cruncher插件跨站请求伪造漏洞
CVE-2015-1197cpio 目录遍历漏洞
CVE-2015-0626Cisco Hosted Collaboration Solution 输入验证漏洞
CVE-2015-0623Cisco Web Security Appliance Administrator report页面跨站脚本漏洞
CVE-2015-0622Cisco Wireless LAN Controller Wireless Intrusion Detection功能输入验证漏洞
CVE-2015-1349ISC BIND named进程资源管理错误漏洞
CVE-2014-6147IBM Flex System Manager 信息泄露漏洞
CVE-2014-5286多款TIBCO产品ActiveMatrix Policy Manager Authentication模块权限许可和访问控制漏洞
CVE-2014-9423MIT Kerberos 5 信息泄露漏洞
CVE-2014-9422MIT krb5 kadmind 安全绕过漏洞
CVE-2014-9421MIT Kerberos 5 远程代码执行漏洞
CVE-2014-6304PNMsoft Sequence Kinetics 信息泄露漏洞
CVE-2014-6303PNMsoft Sequence Kinetics Monitoring Administration页面资源管理错误漏洞
CVE-2014-6302PNMsoft Sequence Kinetics 安全漏洞
CVE-2014-6301PNMsoft Sequence Kinetics tables-management模块跨站脚本漏洞
CVE-2015-1879WordPress Google Doc Embedder插件跨站脚本漏洞
CVE-2014-3578Pivotal Software Spring Framework 目录遍历漏洞
CVE-2015-1604Adminsystems CMS 输入验证漏洞
CVE-2015-1603Adminsystems CMS 跨站脚本漏洞
CVE-2015-1592Six Apart Movable Type 代码注入漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2014-5352

No comments yet


Leave a comment