CVE-2014-5352
Published: 3 February 2015
The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
lucid |
Released
(1.8.1+dfsg-2ubuntu0.14)
|
precise |
Released
(1.10+dfsg~beta1-2ubuntu0.6)
|
|
trusty |
Released
(1.12+dfsg-2ubuntu5.1)
|
|
upstream |
Released
(1.12.1+dfsg-17)
|
|
utopic |
Released
(1.12.1+dfsg-10ubuntu0.1)
|
|
Patches: upstream: https://github.com/krb5/krb5/commit/82dc33da50338ac84c7b4102dc6513d897d0506a upstream: http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2015-001.txt vendor: https://www.debian.org/security/2015/dsa-3153 |