CVE-2013-1416

Priority
Medium
Description
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution
Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly
perform service-principal realm referral, which allows remote authenticated
users to cause a denial of service (NULL pointer dereference and daemon
crash) via a crafted TGS-REQ request.
References
Bugs
Notes
jdstrand> per Debian, only krb5 releases 1.7 to 1.10 are affected
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.10.1+dfsg-5)
Ubuntu 10.04 LTS (Lucid Lynx):released (1.8.1+dfsg-2ubuntu0.13)
Ubuntu 12.04 LTS (Precise Pangolin):released (1.10+dfsg~beta1-2ubuntu0.5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (1.11.3+dfsg-3ubuntu2)
Ubuntu 14.10 (Utopic Unicorn):not-affected (1.11.3+dfsg-3ubuntu2)
Patches:
Upstream:https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81
More Information

Valid XHTML 1.0 Strict

Updated: 2014-08-11 14:14:43 UTC (commit 8348)