First published: Tue Mar 31 2020(Updated: )
Russ Allbery discovered that pam-krb5 incorrectly handled some responses. An attacker could possibly use this issue to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libpam-krb5 | <4.8-2ubuntu0.1 | 4.8-2ubuntu0.1 |
Ubuntu | =19.10 | |
All of | ||
ubuntu/libpam-krb5 | <4.8-1ubuntu0.1 | 4.8-1ubuntu0.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libpam-krb5 | <4.7-2ubuntu0.1 | 4.7-2ubuntu0.1 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libpam-krb5 | <4.6-2ubuntu0.1~esm1 | 4.6-2ubuntu0.1~esm1 |
Ubuntu | =14.04 | |
All of | ||
ubuntu/libpam-krb5 | <4.5-3ubuntu0.1 | 4.5-3ubuntu0.1 |
Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4314-1 is critical due to the potential for arbitrary code execution by an attacker.
To fix USN-4314-1, update the libpam-krb5 package to the latest version available for your Ubuntu release.
USN-4314-1 affects Ubuntu versions 19.10, 18.04, 16.04, 14.04, and 12.04 with specific libpam-krb5 versions.
Yes, USN-4314-1 is a remote code execution vulnerability that allows attackers to execute arbitrary code remotely.
The vulnerability in USN-4314-1 was discovered by Russ Allbery.