CVE-2016-3120

Priority
Description
The validate_as_request function in kdc_util.c in the Key Distribution
Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before
1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client
data structure, which allows remote authenticated users to cause a denial
of service (NULL pointer dereference and daemon crash) via an S4U2Self
request.
Notes
 ratliff> KDC is not supported for core and touch
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.14.3+dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Trusty/esm:released (1.12+dfsg-2ubuntu5.4)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.13.2+dfsg-5ubuntu2.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.14.3+dfsg-2ubuntu1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (1.14.3+dfsg-2ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (1.14.3+dfsg-2ubuntu1)
Ubuntu 19.10 (Eoan):not-affected (1.14.3+dfsg-2ubuntu1)
Patches:
Upstream:https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
More Information

Updated: 2019-04-26 14:16:53 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)