CVE-2013-1415 (retired)

Priority
Description
The pkinit_check_kdc_pkid function in
plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation
in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before
1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during
extraction of fields from an X.509 certificate, which allows remote
attackers to cause a denial of service (NULL pointer dereference and daemon
crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.10.1+dfsg-4)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (1.10.1+dfsg-4+nmu1)
Patches:
Upstream:https://github.com/krb5/krb5/commit/c773d3c775e9b2d88bcdff5f8a8ba88d7ec4e8ed
Upstream:https://github.com/krb5/krb5/commit/b71f8c4aacea8849ceaf31a2fa95e143f3943097 (cleanup)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-09-19 15:43:42 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)