[Bug 1009422] Re: (CVE-2012-1013) krb5 : kadmind denial of service
Bug Watch Updater
1009422 at bugs.launchpad.net
Sat Oct 28 06:33:31 UTC 2017
Launchpad has imported 8 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=827517.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.
------------------------------------------------------------------------
On 2012-06-01T16:42:30+00:00 Vincent wrote:
MIT Kerberos 5 version 1.10.2 was released [1] and noted as fixing:
* Fix a kadmind denial of service issue (null pointer dereference),
which could only be triggered by an administrator with the "create"
privilege. [CVE-2012-1013]
No information is currently available on which versions are affected by
this flaw.
[1] http://mailman.mit.edu/pipermail/kerberos-
announce/2012q2/000136.html
Reply at:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/0
------------------------------------------------------------------------
On 2012-06-01T20:17:27+00:00 Vincent wrote:
Upstream bug report:
http://krbdev.mit.edu/rt/Ticket/Display.html?id=7152
And the upstream fix:
https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b
This only affects krb5 1.8 and higher, and only clients authorized to
create principals can trigger the bug (so requires administrative
privileges).
Reply at:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/1
------------------------------------------------------------------------
On 2012-06-01T20:18:28+00:00 Vincent wrote:
Created krb5 tracking bugs for this issue
Affects: fedora-all [bug 827598]
Reply at:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/2
------------------------------------------------------------------------
On 2012-06-13T21:34:03+00:00 Fedora wrote:
krb5-1.10-7.fc17 has been pushed to the Fedora 17 stable repository. If
problems still persist, please make note of it in this bug report.
Reply at:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/4
------------------------------------------------------------------------
On 2012-06-13T21:35:17+00:00 Fedora wrote:
krb5-1.9.3-2.fc16 has been pushed to the Fedora 16 stable repository.
If problems still persist, please make note of it in this bug report.
Reply at:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/5
------------------------------------------------------------------------
On 2012-06-13T21:36:27+00:00 Fedora wrote:
krb5-1.9.3-2.fc15 has been pushed to the Fedora 15 stable repository.
If problems still persist, please make note of it in this bug report.
Reply at:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/6
------------------------------------------------------------------------
On 2012-07-31T18:56:57+00:00 errata-xmlrpc wrote:
This issue has been addressed in following products:
Red Hat Enterprise Linux 6
Via RHSA-2012:1131 https://rhn.redhat.com/errata/RHSA-2012-1131.html
Reply at:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/10
------------------------------------------------------------------------
On 2012-07-31T21:43:19+00:00 Vincent wrote:
Statement:
Not vulnerable. This issue did not affect the versions of krb5 as
shipped with Red Hat Enterprise Linux 4 and 5.
Reply at:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/comments/11
** Changed in: krb5 (Fedora)
Status: Unknown => Fix Released
** Changed in: krb5 (Fedora)
Importance: Unknown => Low
** Bug watch added: krbdev.mit.edu/rt/ #7152
http://krbdev.mit.edu/rt/Ticket/Display.html?id=7152
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1009422
Title:
(CVE-2012-1013) krb5 : kadmind denial of service
Status in krb5 package in Ubuntu:
Fix Released
Status in krb5 package in Fedora:
Fix Released
Bug description:
https://secunia.com/advisories/49346/
Description
A weakness has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).
The vulnerability is caused due to a NULL pointer dereference error in
the "check_1_6_dummy()" function in src/lib/kadm5/srv/svr_principal.c.
This can be exploited to cause a crash via a create-principal request
containing no password but the KRB5_KDB_DISALLOW_ALL_TIX flag.
Successful exploitation requires an administrator account with
"create" privileges.
The weakness is reported in versions prior to 1.10.2.
Solution
Update to version 1.10.2.
Provided and/or discovered by
Reported by the vendor.
Original Advisory
http://web.mit.edu/kerberos/krb5-1.10/
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1009422/+subscriptions
More information about the foundations-bugs
mailing list