Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2013-1415

Published: 5 March 2013

The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.

Priority

Medium

Status

Package Release Status
krb5
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid
Released (1.8.1+dfsg-2ubuntu0.13)
oneiric Ignored
(end of life)
precise
Released (1.10+dfsg~beta1-2ubuntu0.5)
quantal Ignored
(end of life)
raring Not vulnerable
(1.10.1+dfsg-4+nmu1)
saucy Not vulnerable
(1.10.1+dfsg-4+nmu1)
trusty Not vulnerable
(1.10.1+dfsg-4+nmu1)
upstream
Released (1.10.1+dfsg-4)
Patches:
upstream: https://github.com/krb5/krb5/commit/c773d3c775e9b2d88bcdff5f8a8ba88d7ec4e8ed
upstream: https://github.com/krb5/krb5/commit/b71f8c4aacea8849ceaf31a2fa95e143f3943097
Binaries built from this source package are in Universe and so are supported by the community.