CVE-2014-5355 (retired)

Priority
Description
MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a
krb5_read_message data field is represented as a string ending with a '\0'
character, which allows remote attackers to (1) cause a denial of service
(NULL pointer dereference) via a zero-byte version string or (2) cause a
denial of service (out-of-bounds read) by omitting the '\0' character,
related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.12.1+dfsg-18)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.13.2+dfsg-3)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-09-19 15:49:54 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)