CVE-2015-2694 (retired)

Priority
Description
The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x
before 1.13.2 do not properly track whether a client's request has been
validated, which allows remote attackers to bypass an intended
preauthentication requirement by providing (1) zero bytes of data or (2) an
arbitrary realm name, related to plugins/preauth/otp/main.c and
plugins/preauth/pkinit/pkinit_srv.c.
Notes
 tyhicks> affects 1.12 and later
Assigned-to
mdeslaur
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.13.2,1.12.1+dfsg-20)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.13.2+dfsg-3)
Patches:
Upstream:https://github.com/krb5/krb5/commit/e3b5a5e5267818c97750b266df50b6a3d4649604
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-08-23 09:06:15 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)