CVE-2010-1321
Published: 18 May 2010
The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
dapper |
Released
(1.4.3-5ubuntu0.11)
|
hardy |
Released
(1.6.dfsg.3~beta1-2ubuntu1.5)
|
|
jaunty |
Released
(1.6.dfsg.4~beta1-5ubuntu2.4)
|
|
karmic |
Released
(1.7dfsg~beta3-1ubuntu0.6)
|
|
lucid |
Released
(1.8.1+dfsg-2ubuntu0.2)
|
|
upstream |
Released
(1.8.1+dfsg-3)
|
|
sun-jav6 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Released
(6.22-0ubuntu1~8.04.1)
|
|
jaunty |
Released
(6.22-0ubuntu1~9.04.1)
|
|
karmic |
Released
(6.22-0ubuntu1~9.10.1)
|
|
lucid |
Released
(6.22-0ubuntu1~10.04)
|
|
maverick |
Released
(6.22-0ubuntu1~10.10)
|
|
upstream |
Released
(6.22)
|