CVE-2014-4343
Publication date 21 July 2014
Last updated 24 July 2024
Ubuntu priority
Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
Status
Package | Ubuntu Release | Status |
---|---|---|
krb5 | 14.04 LTS trusty |
Fixed 1.12+dfsg-2ubuntu4.2
|
Notes
seth-arnold
Remote unauthenticated triggering is possible though the commit message for the patch indicates why it is unlikely; thus 'medium'.
References
Related Ubuntu Security Notices (USN)
- USN-2310-1
- Kerberos vulnerabilities
- 11 August 2014