CVE-2011-1529
Published: 18 October 2011
The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.
From the Ubuntu Security Team
sbeattie> CRD Tuesday, 18 October 2011, at 14:00 US/Eastern time sbeattie> 1.8 and 1.9 only
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
hardy |
Not vulnerable
|
|
lucid |
Released
(1.8.1+dfsg-2ubuntu0.10)
|
|
maverick |
Released
(1.8.1+dfsg-5ubuntu0.8)
|
|
natty |
Released
(1.8.3+dfsg-5ubuntu2.2)
|
|
oneiric |
Released
(1.9.1+dfsg-1ubuntu1.1)
|
|
Patches: upstream: http://web.mit.edu/kerberos/advisories/2011-006-patch-r18.txt |