CVE-2013-1416 (retired)

Priority
Description
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution
Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly
perform service-principal realm referral, which allows remote authenticated
users to cause a denial of service (NULL pointer dereference and daemon
crash) via a crafted TGS-REQ request.
Notes
 jdstrand> per Debian, only krb5 releases 1.7 to 1.10 are affected
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.10.1+dfsg-5)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (1.11.3+dfsg-3ubuntu2)
Patches:
Upstream:https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-09-19 15:43:42 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)