CVE-2014-5353
Published: 16 December 2014
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
upstream |
Released
(1.12.1+dfsg-16)
|
lucid |
Released
(1.8.1+dfsg-2ubuntu0.14)
|
|
precise |
Released
(1.10+dfsg~beta1-2ubuntu0.6)
|
|
trusty |
Released
(1.12+dfsg-2ubuntu5.1)
|
|
utopic |
Released
(1.12.1+dfsg-10ubuntu0.1)
|
|
Patches: upstream: https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3 |
||
Binaries built from this source package are in Universe and so are supported by the community. |