It was discovered that Kerberos incorrectly handled certain crafted Draft 9 requests. A remote attacker could use this issue to cause the daemon to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-1016)
It was discovered that Kerberos incorrectly handled certain malformed KRB5PADATAPKASREQ AS-REQ requests. A remote attacker could use this issue to cause the daemon to crash, resulting in a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 12.04 LTS. (CVE-2013-1415)
It was discovered that Kerberos incorrectly handled certain crafted TGS-REQ requests. A remote authenticated attacker could use this issue to cause the daemon to crash, resulting in a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 12.04 LTS. (CVE-2013-1416)
It was discovered that Kerberos incorrectly handled certain crafted requests when multiple realms were configured. A remote attacker could use this issue to cause the daemon to crash, resulting in a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 12.04 LTS. (CVE-2013-1418, CVE-2013-6800)
It was discovered that Kerberos incorrectly handled certain invalid tokens. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could be used to cause the daemon to crash, resulting in a denial of service. (CVE-2014-4341, CVE-2014-4342)
It was discovered that Kerberos incorrectly handled certain mechanisms when used with SPNEGO. If a remote attacker were able to perform a machine-in-the-middle attack, this flaw could be used to cause clients to crash, resulting in a denial of service. (CVE-2014-4343)
It was discovered that Kerberos incorrectly handled certain continuation tokens during SPNEGO negotiations. A remote attacker could use this issue to cause the daemon to crash, resulting in a denial of service. (CVE-2014-4344)
Tomas Kuthan and Greg Hudson discovered that the Kerberos kadmind daemon incorrectly handled buffers when used with the LDAP backend. A remote attacker could use this issue to cause the daemon to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-4345)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-admin-server" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-doc" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-gss-samples" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-kdc" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-kdc-ldap" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-locales" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-multidev" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-otp" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-pkinit" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "krb5-user" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libgssapi-krb5-2" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libgssrpc4" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libk5crypto3" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkadm5clnt-mit9" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkadm5srv-mit8" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkadm5srv-mit9" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkdb5-7" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkrad-dev" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkrad0" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkrb5-3" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkrb5-dbg" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkrb5-dev" }, { "binary_version": "1.12+dfsg-2ubuntu4.2", "binary_name": "libkrb5support0" } ] }