Amazon Linux 1 Security Advisory: ALAS-2012-114
Advisory Release Date: 2012-08-03 15:55 Pacific
Advisory Updated Date: 2014-09-14 16:48 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
An uninitialized pointer use flaw was found in the way the MIT Kerberos KDC handled initial authentication requests (AS-REQ). A remote, unauthenticated attacker could use this flaw to crash the KDC via a specially-crafted AS-REQ request. (CVE-2012-1015)
A NULL pointer dereference flaw was found in the MIT Kerberos administration daemon, kadmind. A Kerberos administrator who has the "create" privilege could use this flaw to crash kadmind. (CVE-2012-1013)
Affected Packages:
krb5
Issue Correction:
Run yum update krb5 to update your system.
i686:
krb5-pkinit-openssl-1.9-33.22.amzn1.i686
krb5-server-ldap-1.9-33.22.amzn1.i686
krb5-debuginfo-1.9-33.22.amzn1.i686
krb5-devel-1.9-33.22.amzn1.i686
krb5-workstation-1.9-33.22.amzn1.i686
krb5-libs-1.9-33.22.amzn1.i686
krb5-server-1.9-33.22.amzn1.i686
src:
krb5-1.9-33.22.amzn1.src
x86_64:
krb5-server-ldap-1.9-33.22.amzn1.x86_64
krb5-workstation-1.9-33.22.amzn1.x86_64
krb5-libs-1.9-33.22.amzn1.x86_64
krb5-pkinit-openssl-1.9-33.22.amzn1.x86_64
krb5-devel-1.9-33.22.amzn1.x86_64
krb5-server-1.9-33.22.amzn1.x86_64
krb5-debuginfo-1.9-33.22.amzn1.x86_64