CVE-2013-1415

Priority
Medium
Description
The pkinit_check_kdc_pkid function in
plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation
in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before
1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during
extraction of fields from an X.509 certificate, which allows remote
attackers to cause a denial of service (NULL pointer dereference and daemon
crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
References
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.10.1+dfsg-4)
Ubuntu 10.04 LTS (Lucid Lynx):released (1.8.1+dfsg-2ubuntu0.13)
Ubuntu 12.04 LTS (Precise Pangolin):released (1.10+dfsg~beta1-2ubuntu0.5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (1.10.1+dfsg-4+nmu1)
Ubuntu 14.10 (Utopic Unicorn):not-affected (1.10.1+dfsg-4+nmu1)
Patches:
Upstream:https://github.com/krb5/krb5/commit/c773d3c775e9b2d88bcdff5f8a8ba88d7ec4e8ed
Upstream:https://github.com/krb5/krb5/commit/b71f8c4aacea8849ceaf31a2fa95e143f3943097 (cleanup)
More Information

Valid XHTML 1.0 Strict

Updated: 2014-08-11 14:14:43 UTC (commit 8348)