Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-5351

Published: 9 October 2014

The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.

Priority

Low

Status

Package Release Status
krb5
Launchpad, Ubuntu, Debian
lucid
Released (1.8.1+dfsg-2ubuntu0.14)
precise
Released (1.10+dfsg~beta1-2ubuntu0.6)
trusty
Released (1.12+dfsg-2ubuntu5.1)
upstream
Released (1.12.1+dfsg-10)
utopic Not vulnerable
(1.12.1+dfsg-10)
Patches:
upstream: https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
Binaries built from this source package are in Universe and so are supported by the community.