[Bug 1009422] Re: (CVE-2012-1013) krb5 : kadmind denial of service
Launchpad Bug Tracker
1009422 at bugs.launchpad.net
Tue Jul 31 18:35:36 UTC 2012
This bug was fixed in the package krb5 - 1.10+dfsg~beta1-2ubuntu0.3
---------------
krb5 (1.10+dfsg~beta1-2ubuntu0.3) precise-security; urgency=low
* SECURITY UPDATE: KDC heap corruption and crash vulnerabilities
- debian/patches/MITKRB5-SA-2012-001.patch: initialize pointers both
at allocation and assignment time
- CVE-2012-1015, CVE-2012-1014
* SECURITY UPDATE: denial of service in kadmind (LP: #1009422)
- debian/patches/krb5-CVE-2012-1013.patch: check for null password
- CVE-2012-1013
* SECURITY UPDATE: insufficient ACL checking on get_strings/set_string
- debian/patches/krb5-CVE-2012-1012.patch: make the access
controls for get_strings/set_string mirror those of
get_principal/modify_principal
- CVE-2012-1012
-- Steve Beattie <sbeattie at ubuntu.com> Thu, 26 Jul 2012 14:29:35 -0700
** Changed in: krb5 (Ubuntu)
Status: Confirmed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-1012
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-1014
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-1015
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1009422
Title:
(CVE-2012-1013) krb5 : kadmind denial of service
Status in “krb5” package in Ubuntu:
Fix Released
Status in “krb5” package in Fedora:
Unknown
Bug description:
https://secunia.com/advisories/49346/
Description
A weakness has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).
The vulnerability is caused due to a NULL pointer dereference error in
the "check_1_6_dummy()" function in src/lib/kadm5/srv/svr_principal.c.
This can be exploited to cause a crash via a create-principal request
containing no password but the KRB5_KDB_DISALLOW_ALL_TIX flag.
Successful exploitation requires an administrator account with
"create" privileges.
The weakness is reported in versions prior to 1.10.2.
Solution
Update to version 1.10.2.
Provided and/or discovered by
Reported by the vendor.
Original Advisory
http://web.mit.edu/kerberos/krb5-1.10/
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/+subscriptions
More information about the foundations-bugs
mailing list