CVE-2011-0284
Published: 15 March 2011
Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
From the Ubuntu Security Team
Cameron Meadors discovered that the MIT Kerberos 5 Key Distribution Center (KDC) daemon is vulnerable to a double-free condition if the Public Key Cryptography for Initial Authentication (PKINIT) capability is enabled. This could allow a remote attacker to cause a denial of service.
Notes
Author | Note |
---|---|
sbeattie | CRD Tuesday, 15 March 2011, at 14:00 US/Eastern time |
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
|
hardy |
Not vulnerable
|
|
karmic |
Released
(1.7dfsg~beta3-1ubuntu0.12)
|
|
lucid |
Released
(1.8.1+dfsg-2ubuntu0.8)
|
|
maverick |
Released
(1.8.1+dfsg-5ubuntu0.6)
|
|
upstream |
Pending
|
|
Patches: upstream: http://web.mit.edu/kerberos/advisories/2011-003-patch.txt |