CVE-2011-1529

Publication date 18 October 2011

Last updated 24 July 2024


Ubuntu priority

The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.

From the Ubuntu Security Team

sbeattie> CRD Tuesday, 18 October 2011, at 14:00 US/Eastern time sbeattie> 1.8 and 1.9 only

Status

Package Ubuntu Release Status
krb5 11.10 oneiric
Fixed 1.9.1+dfsg-1ubuntu1.1
11.04 natty
Fixed 1.8.3+dfsg-5ubuntu2.2
10.10 maverick
Fixed 1.8.1+dfsg-5ubuntu0.8
10.04 LTS lucid
Fixed 1.8.1+dfsg-2ubuntu0.10
8.04 LTS hardy
Not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
krb5

References

Related Ubuntu Security Notices (USN)

    • USN-1233-1
    • Kerberos Vulnerabilities
    • 18 October 2011

Other references