USN-2810-1

Source
https://ubuntu.com/security/notices/USN-2810-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2810-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2810-1
Upstream
Related
Published
2015-11-12T17:50:55.940907Z
Modified
2025-10-13T04:34:09Z
Summary
krb5 vulnerabilities
Details

It was discovered that the Kerberos kpasswd service incorrectly handled certain UDP packets. A remote attacker could possibly use this issue to cause resource consumption, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS. (CVE-2002-2443)

It was discovered that Kerberos incorrectly handled null bytes in certain data fields. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-5355)

It was discovered that the Kerberos kdcpreauth modules incorrectly tracked certain client requests. A remote attacker could possibly use this issue to bypass intended preauthentication requirements. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-2694)

It was discovered that Kerberos incorrectly handled certain SPNEGO packets. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2695)

It was discovered that Kerberos incorrectly handled certain IAKERB packets. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2696, CVE-2015-2698)

It was discovered that Kerberos incorrectly handled certain TGS requests. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2697)

References

Affected packages

Ubuntu:14.04:LTS / krb5

Package

Name
krb5
Purl
pkg:deb/ubuntu/krb5@1.12+dfsg-2ubuntu5.2?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12+dfsg-2ubuntu5.2

Affected versions

1.*

1.10.1+dfsg-6.1ubuntu1
1.11.3+dfsg-3ubuntu2
1.12+dfsg-2ubuntu1
1.12+dfsg-2ubuntu2
1.12+dfsg-2ubuntu3
1.12+dfsg-2ubuntu4
1.12+dfsg-2ubuntu4.2
1.12+dfsg-2ubuntu5
1.12+dfsg-2ubuntu5.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-admin-server"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-gss-samples"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-kdc"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-kdc-ldap"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-locales"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-multidev"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-otp"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-pkinit"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "krb5-user"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libgssapi-krb5-2"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libgssrpc4"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libk5crypto3"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkadm5clnt-mit9"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkadm5srv-mit8"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkadm5srv-mit9"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkdb5-7"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkrad-dev"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkrad0"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkrb5-3"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkrb5-dev"
        },
        {
            "binary_version": "1.12+dfsg-2ubuntu5.2",
            "binary_name": "libkrb5support0"
        }
    ],
    "availability": "No subscription required"
}

Database specific

{
    "cves_map": {
        "cves": [
            {
                "severity": [
                    {
                        "score": "low",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2014-5355"
            },
            {
                "severity": [
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2015-2694"
            },
            {
                "severity": [
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2015-2695"
            },
            {
                "severity": [
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2015-2696"
            },
            {
                "severity": [
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2015-2697"
            },
            {
                "severity": [
                    {
                        "score": "medium",
                        "type": "Ubuntu"
                    }
                ],
                "id": "CVE-2015-2698"
            }
        ],
        "ecosystem": "Ubuntu:14.04:LTS"
    }
}