CVE-2014-9422 - Improper Access Control

Severity

61%

Complexity

39%

Confidentiality

141%

The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.

The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.

CVSS 2.0 Base Score 6.1. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (AV:N/AC:H/Au:S/C:P/I:P/A:C).

Overview

Type

Mit Kerberos 5

First reported 10 years ago

2015-02-19 11:59:00

Last updated 5 years ago

2020-01-21 15:46:00

Affected Software

Mit Kerberos 5 1.11

1.11

Mit Kerberos 5 1.11.1

1.11.1

Mit Kerberos 5 1.11.2

1.11.2

Mit Kerberos 5 1.11.3

1.11.3

Mit Kerberos 5 1.11.4

1.11.4

Mit Kerberos 5 1.11.5

1.11.5

Mit Kerberos 5 1.12

1.12

Mit Kerberos 5 1.12.1

1.12.1

Mit Kerberos 5 1.12.2

1.12.2

Mit Kerberos 5 1.13

1.13

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.