Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-1013

Published: 7 June 2012

The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.

Notes

AuthorNote
sbeattie
can only be triggered by authenticated clients with admin
privileges

Priority

Low

Status

Package Release Status
krb5
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid
Released (1.8.1+dfsg-2ubuntu0.11)
natty
Released (1.8.3+dfsg-5ubuntu2.3)
oneiric
Released (1.9.1+dfsg-1ubuntu2.3)
precise
Released (1.10+dfsg~beta1-2ubuntu0.3)
quantal Ignored
(end of life)
raring Not vulnerable
(1.10.1+dfsg-3)
saucy Not vulnerable
(1.10.1+dfsg-3)
trusty Not vulnerable
(1.10.1+dfsg-3)
upstream
Released (1.10.2,1.10.1+dfsg-3)
Patches:
upstream: https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
Binaries built from this source package are in Universe and so are supported by the community.