CVE-2016-3120

Priority
Description
The validate_as_request function in kdc_util.c in the Key Distribution
Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before
1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client
data structure, which allows remote authenticated users to cause a denial
of service (NULL pointer dereference and daemon crash) via an S4U2Self
request.
Notes
ratliffKDC is not supported for core and touch
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.14.3+dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):released (1.12+dfsg-2ubuntu5.4)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.13.2+dfsg-5ubuntu2.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.14.3+dfsg-2ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (1.14.3+dfsg-2ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1.14.3+dfsg-2ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.14.3+dfsg-2ubuntu1)
Patches:
Upstream:https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-12-05 19:29:47 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)