Published: 13 February 2016
The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
From the Ubuntu security team
It was discovered that Kerberos incorrectly handled policy names. A remote authenticated attacker could possibly use this issue to cause a denial of service.
CVSS 3 base score: 7.5
Launchpad, Ubuntu, Debian
|Ubuntu 18.04 LTS (Bionic Beaver)||
|Ubuntu 16.04 ESM (Xenial Xerus)||
|Ubuntu 14.04 ESM (Trusty Tahr)||
|Binaries built from this source package are in Universe and so are supported by the community.|
introduced in 1.12
use of kadmind is not supported in touch and core