Packages
- krb5 - MIT Kerberos Network Authentication Protocol
Details
Emmanuel Bouillon discovered that the MIT krb5 Key Distribution Center
(KDC) daemon could free an uninitialized pointer when handling a
malformed AS-REQ message. A remote unauthenticated attacker could
use this to cause a denial of service or possibly execute arbitrary
code. (CVE-2012-1015)
Emmanuel Bouillon discovered that the MIT krb5 Key Distribution Center
(KDC) daemon could dereference an uninitialized pointer while handling
a malformed AS-REQ message. A remote unauthenticated attacker could
use this to cause a denial of service or possibly execute arbitrary
code. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-1014)
Simo Sorce discovered that the MIT krb5 Key Distribution Center (KDC)
daemon could dereference a NULL pointer when handling a malformed
TGS-REQ message. A remote authenticated attacker could use this to
cause a denial of...
Emmanuel Bouillon discovered that the MIT krb5 Key Distribution Center
(KDC) daemon could free an uninitialized pointer when handling a
malformed AS-REQ message. A remote unauthenticated attacker could
use this to cause a denial of service or possibly execute arbitrary
code. (CVE-2012-1015)
Emmanuel Bouillon discovered that the MIT krb5 Key Distribution Center
(KDC) daemon could dereference an uninitialized pointer while handling
a malformed AS-REQ message. A remote unauthenticated attacker could
use this to cause a denial of service or possibly execute arbitrary
code. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-1014)
Simo Sorce discovered that the MIT krb5 Key Distribution Center (KDC)
daemon could dereference a NULL pointer when handling a malformed
TGS-REQ message. A remote authenticated attacker could use this to
cause a denial of service. (CVE-2012-1013)
It was discovered that the kadmin protocol implementation in MIT krb5
did not properly restrict access to the SET_STRING and GET_STRINGS
operations. A remote authenticated attacker could use this to expose
or modify sensitive information. This issue only affected Ubuntu
12.04 LTS. (CVE-2012-1012)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
12.04 precise | krb5-admin-server – 1.10+dfsg~beta1-2ubuntu0.3 | ||
krb5-kdc-ldap – 1.10+dfsg~beta1-2ubuntu0.3 | |||
krb5-kdc – 1.10+dfsg~beta1-2ubuntu0.3 | |||
11.10 oneiric | krb5-admin-server – 1.9.1+dfsg-1ubuntu2.3 | ||
krb5-kdc-ldap – 1.9.1+dfsg-1ubuntu2.3 | |||
krb5-kdc – 1.9.1+dfsg-1ubuntu2.3 | |||
11.04 natty | krb5-admin-server – 1.8.3+dfsg-5ubuntu2.3 | ||
krb5-kdc-ldap – 1.8.3+dfsg-5ubuntu2.3 | |||
krb5-kdc – 1.8.3+dfsg-5ubuntu2.3 | |||
10.04 lucid | krb5-admin-server – 1.8.1+dfsg-2ubuntu0.11 | ||
krb5-kdc-ldap – 1.8.1+dfsg-2ubuntu0.11 | |||
krb5-kdc – 1.8.1+dfsg-2ubuntu0.11 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.