Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2013-1417

Published: 20 November 2013

do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.

Notes

AuthorNote
mdeslaur
only 1.11.x

Priority

Medium

Status

Package Release Status
krb5
Launchpad, Ubuntu, Debian
lucid Not vulnerable
(1.8.1+dfsg-2ubuntu0.11)
precise Not vulnerable
(1.10+dfsg~beta1-2ubuntu0.3)
quantal Not vulnerable
(1.10.1+dfsg-2)
raring Not vulnerable
(1.10.1+dfsg-4+nmu1)
saucy Not vulnerable
(1.10.1+dfsg-6.1ubuntu1)
trusty Not vulnerable
(1.12+dfsg-2ubuntu4)
upstream
Released (1.11.4)
Patches:
upstream: https://github.com/krb5/krb5/commit/4c023ba43c16396f0d199e2df1cfa59b88b62acc
Binaries built from this source package are in Universe and so are supported by the community.