CVE-2014-4344

Priority
Medium
Description
The acc_ctx_cont function in the SPNEGO acceptor in
lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through
1.12.x before 1.12.2 allows remote attackers to cause a denial of service
(NULL pointer dereference and application crash) via an empty continuation
token at a certain point during a SPNEGO negotiation.
References
Bugs
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.12.1+dfsg-5)
Ubuntu 10.04 LTS (Lucid Lynx):released (1.8.1+dfsg-2ubuntu0.13)
Ubuntu 12.04 LTS (Precise Pangolin):released (1.10+dfsg~beta1-2ubuntu0.5)
Ubuntu 14.04 LTS (Trusty Tahr):released (1.12+dfsg-2ubuntu4.2)
Ubuntu 14.10 (Utopic Unicorn):not-affected (1.12.1+dfsg-6)
Patches:
Upstream:https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b
More Information

Valid XHTML 1.0 Strict

Updated: 2014-08-20 21:14:37 UTC (commit 8395)