Описание
ELSA-2013-0748: krb5 security update (MODERATE)
[1.10.3-10.2]
- incorporate upstream patch to fix a NULL pointer dereference while processing certain TGS requests (CVE-2013-1416, #950342)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
krb5-devel
1.10.3-10.el6_4.2
krb5-libs
1.10.3-10.el6_4.2
krb5-pkinit-openssl
1.10.3-10.el6_4.2
krb5-server
1.10.3-10.el6_4.2
krb5-server-ldap
1.10.3-10.el6_4.2
krb5-workstation
1.10.3-10.el6_4.2
Oracle Linux i686
krb5-devel
1.10.3-10.el6_4.2
krb5-libs
1.10.3-10.el6_4.2
krb5-pkinit-openssl
1.10.3-10.el6_4.2
krb5-server
1.10.3-10.el6_4.2
krb5-server-ldap
1.10.3-10.el6_4.2
krb5-workstation
1.10.3-10.el6_4.2
Связанные CVE
Связанные уязвимости
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
The prep_reprocess_req function in do_tgs_req.c in the Key Distributio ...
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.