Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1", "name": "https://github.com/krb5/krb5/commit/dc7ed55c689d57de7f7408b34631bf06fec9dab1", "tags": [], "refsource": "CONFIRM"}, {"url": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980", "name": "http://krbdev.mit.edu/rt/Ticket/Display.html?id=7980", "tags": [], "refsource": "CONFIRM"}, {"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt", "name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/69168", "name": "69168", "tags": [], "refsource": "BID"}, {"url": "http://www.securitytracker.com/id/1030705", "name": "1030705", "tags": [], "refsource": "SECTRACK"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html", "name": "SUSE-SU-2014:1028", "tags": [], "refsource": "SUSE"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html", "name": "openSUSE-SU-2014:1043", "tags": [], "refsource": "SUSE"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-1255.html", "name": "RHSA-2014:1255", "tags": [], "refsource": "REDHAT"}, {"url": "http://www.debian.org/security/2014/dsa-3000", "name": "DSA-3000", "tags": [], "refsource": "DEBIAN"}, {"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors", "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_4345_numeric_errors", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/59415", "name": "59415", "tags": [], "refsource": "SECUNIA"}, {"url": "http://security.gentoo.org/glsa/glsa-201412-53.xml", "name": "GLSA-201412-53", "tags": [], "refsource": "GENTOO"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0439.html", "name": "RHSA-2015:0439", "tags": [], "refsource": "REDHAT"}, {"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", "tags": [], "refsource": "CONFIRM"}, {"url": "https://github.com/krb5/krb5/pull/181", "name": "https://github.com/krb5/krb5/pull/181", "tags": [], "refsource": "CONFIRM"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128157", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1128157", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.osvdb.org/109908", "name": "109908", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:165", "name": "MDVSA-2014:165", "tags": [], "refsource": "MANDRIVA"}, {"url": "http://secunia.com/advisories/61353", "name": "61353", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/61314", "name": "61314", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/60776", "name": "60776", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/60535", "name": "60535", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/59993", "name": "59993", "tags": [], "refsource": "SECUNIA"}, {"url": "http://secunia.com/advisories/59102", "name": "59102", "tags": [], "refsource": "SECUNIA"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137056.html", "name": "FEDORA-2014-9305", "tags": [], "refsource": "FEDORA"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136640.html", "name": "FEDORA-2014-9315", "tags": [], "refsource": "FEDORA"}, {"url": "http://linux.oracle.com/errata/ELSA-2014-1255.html", "name": "http://linux.oracle.com/errata/ELSA-2014-1255.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://advisories.mageia.org/MGASA-2014-0345.html", "name": "http://advisories.mageia.org/MGASA-2014-0345.html", "tags": [], "refsource": "CONFIRM"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95212", "name": "kerberos-cve20144345-bo(95212)", "tags": [], "refsource": "XF"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "tags": [], "refsource": "CONFIRM"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of \"cpw -keepold\" commands."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-189"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2014-4345", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 8.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 6.8, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2014-08-14T05:01Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2020-01-21T15:46Z"}