CVE-2014-4343 (retired)

Priority
Description
Double free vulnerability in the init_ctx_reselect function in the SPNEGO
initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5)
1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a
denial of service (memory corruption) or possibly execute arbitrary code
via network traffic that appears to come from an intended acceptor, but
specifies a security mechanism different from the one proposed by the
initiator.
Notes
 sarnold> Remote unauthenticated triggering is possible though the commit
  message for the patch indicates why it is unlikely; thus 'medium'.
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.12.1+dfsg-5)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (1.12.1+dfsg-6)
Patches:
Upstream:https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
More Information

Updated: 2019-09-19 15:49:38 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)