CVE-2014-4343

Priority
Medium
Description
Double free vulnerability in the init_ctx_reselect function in the SPNEGO
initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5)
1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a
denial of service (memory corruption) or possibly execute arbitrary code
via network traffic that appears to come from an intended acceptor, but
specifies a security mechanism different from the one proposed by the
initiator.
References
Bugs
Notes
sarnold> Remote unauthenticated triggering is possible though the commit
message for the patch indicates why it is unlikely; thus 'medium'.
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.12.1+dfsg-5)
Ubuntu 10.04 LTS (Lucid Lynx):released (1.8.1+dfsg-2ubuntu0.13)
Ubuntu 12.04 LTS (Precise Pangolin):released (1.10+dfsg~beta1-2ubuntu0.5)
Ubuntu 14.04 LTS (Trusty Tahr):released (1.12+dfsg-2ubuntu4.2)
Ubuntu 14.10 (Utopic Unicorn):not-affected (1.12.1+dfsg-6)
Patches:
Upstream:https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
More Information

Valid XHTML 1.0 Strict

Updated: 2014-08-20 21:14:37 UTC (commit 8395)