CVE-2014-5354
Published: 16 December 2014
plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
lucid |
Released
(1.8.1+dfsg-2ubuntu0.14)
|
precise |
Released
(1.10+dfsg~beta1-2ubuntu0.6)
|
|
trusty |
Released
(1.12+dfsg-2ubuntu5.1)
|
|
upstream |
Released
(1.12.1+dfsg-16)
|
|
utopic |
Released
(1.12.1+dfsg-10ubuntu0.1)
|
|
Patches: upstream: https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16 upstream: https://github.com/krb5/krb5/commit/877ad027ca2103f3ac2f581451fdd347a76b8981 |
||
Binaries built from this source package are in Universe and so are supported by the community. |