It was discovered that the Kerberos kpasswd service incorrectly handled certain UDP packets. A remote attacker could possibly use this issue to cause resource consumption, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS. (CVE-2002-2443)
It was discovered that Kerberos incorrectly handled null bytes in certain data fields. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-5355)
It was discovered that the Kerberos kdcpreauth modules incorrectly tracked certain client requests. A remote attacker could possibly use this issue to bypass intended preauthentication requirements. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-2694)
It was discovered that Kerberos incorrectly handled certain SPNEGO packets. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2695)
It was discovered that Kerberos incorrectly handled certain IAKERB packets. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2696, CVE-2015-2698)
It was discovered that Kerberos incorrectly handled certain TGS requests. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2697)
{ "binaries": [ { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-admin-server" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-gss-samples" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-kdc" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-kdc-ldap" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-locales" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-multidev" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-otp" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-pkinit" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "krb5-user" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libgssapi-krb5-2" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libgssrpc4" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libk5crypto3" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkadm5clnt-mit9" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkadm5srv-mit8" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkadm5srv-mit9" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkdb5-7" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkrad-dev" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkrad0" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkrb5-3" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkrb5-dev" }, { "binary_version": "1.12+dfsg-2ubuntu5.2", "binary_name": "libkrb5support0" } ], "availability": "No subscription required" }
{ "cves_map": { "cves": [ { "severity": [ { "score": "low", "type": "Ubuntu" } ], "id": "CVE-2014-5355" }, { "severity": [ { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2015-2694" }, { "severity": [ { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2015-2695" }, { "severity": [ { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2015-2696" }, { "severity": [ { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2015-2697" }, { "severity": [ { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2015-2698" } ], "ecosystem": "Ubuntu:14.04:LTS" } }