package: krb5-kdc-ldap
version: 1.12.1+dfsg-15
tags: security pending

Upstream has patched CVE-2014-5354:

    In MIT krb5, when kadmind is configured to use LDAP for the KDC
    database, an authenticated remote attacker can cause a NULL
    dereference by inserting into the database a principal entry which
    contains no long-term keys.

    In order for the LDAP KDC backend to translate a principal entry
    from the database abstraction layer into the form expected by the
    LDAP schema, the principal's keys are encoded into a
    NULL-terminated array of length-value entries to be stored in the
    LDAP database.  However, the subroutine which produced this array
    did not correctly handle the case where no keys were present,
    returning NULL instead of an empty array, and the array was
    unconditionally dereferenced while adding to the list of LDAP
    operations to perform.

    Versions of MIT krb5 prior to 1.12 did not expose a way for
    principal entries to have no long-term key material, and
    therefore are not vulnerable.

        CVSSv2 Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P/E:H/RL:OF/RC:C


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to