CVE-2018-5710

Priority
Description
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The
pre-defined function "strlen" is getting a "NULL" string as a parameter
value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key
Distribution Center (KDC), which allows remote authenticated users to cause
a denial of service (NULL pointer dereference) via a modified kadmin
client.
Notes
Package
Source: krb5 (LP Ubuntu Debian)
Upstream:released (1.16.1-1)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.16.1-1)
Ubuntu 19.04 (Disco Dingo):not-affected (1.16.1-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1.16.1-1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.16.1-1)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-12-05 19:57:17 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)