CVE-2011-0285
Publication date 14 April 2011
Last updated 24 July 2024
Ubuntu priority
The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
Status
Package | Ubuntu Release | Status |
---|---|---|
krb5 | 10.10 maverick |
Fixed 1.8.1+dfsg-5ubuntu0.7
|
10.04 LTS lucid |
Fixed 1.8.1+dfsg-2ubuntu0.9
|
|
9.10 karmic |
Fixed 1.7dfsg~beta3-1ubuntu0.13
|
|
8.04 LTS hardy |
Not affected
|
|
6.06 LTS dapper |
Not affected
|
References
Related Ubuntu Security Notices (USN)
- USN-1116-1
- Kerberos vulnerability
- 19 April 2011