CVE-2014-5351
Published: 9 October 2014
The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
lucid |
Released
(1.8.1+dfsg-2ubuntu0.14)
|
precise |
Released
(1.10+dfsg~beta1-2ubuntu0.6)
|
|
trusty |
Released
(1.12+dfsg-2ubuntu5.1)
|
|
upstream |
Released
(1.12.1+dfsg-10)
|
|
utopic |
Not vulnerable
(1.12.1+dfsg-10)
|
|
Patches: upstream: https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca |
||
Binaries built from this source package are in Universe and so are supported by the community. |