{"id":"MGASA-2013-0336","summary":"Updated krb5 package fixes security vulnerabilities","details":"An authenticated remote client can cause a KDC to crash by making a valid\nTGS-REQ to a KDC serving a realm with a single-component name. The\nprocess_tgs_req() function dereferences a null pointer because an unusual\nfailure condition causes a helper function to return success\n(CVE-2013-1417).\n\nIf a KDC serves multiple realms, certain requests can cause\nsetup_server_realm() to dereference a null pointer, crashing the KDC.\nThis   can be triggered by an unauthenticated user (CVE-2013-1418).\n","modified":"2026-01-30T17:15:37.570471Z","published":"2013-11-20T20:41:07Z","related":["CVE-2013-1417","CVE-2013-1418"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0336.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11668"},{"type":"REPORT","url":"http://web.mit.edu/kerberos/krb5-1.11/README-1.11.4.txt"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1418"}],"affected":[{"package":{"name":"krb5","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/krb5?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.11.1-1.3.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0336.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}