Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: krb5 & mit-krb5 (200303-28)
Date: Mon, 31 Mar 2003 10:21:49
Message-Id: 20030331100014.0AB955762@mail2.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200303-28
6 - - ---------------------------------------------------------------------
7
8 PACKAGE : krb5 & mit-krb5
9 SUMMARY : multiple vulnerabilities fixed
10 DATE : 2003-03-31 10:01 UTC
11 EXPLOIT : remote
12 VERSIONS AFFECTED : krb5: <1.2.7-r2 mit-krb5: <1.2.7
13 FIXED VERSION : krb5: >=1.2.7-r2 mit-krb5: >=1.2.7
14 CVE : CAN-2003-0139 CAN-2003-0138 CAN-2003-0082
15 CAN-2003-0072 CAN-2003-0028
16
17 - - ---------------------------------------------------------------------
18
19 - From advisory:
20 "An attacker who has successfully authenticated to the Kerberos
21 administration daemon (kadmind) may be able to crash kadmind or induce
22 it to leak sensitive information, such as secret keys. For the attack
23 to succeed, it is believed that the configuration of the kadmind
24 installation must allow it to successfully allocate more than INT_MAX
25 bytes of memory."
26
27 Read the full advisory at
28 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-003-xdr.txt
29
30 - From advisory:
31 "A cryptographic weakness in version 4 of the Kerberos protocol allows
32 an attacker to use a chosen-plaintext attack to impersonate any
33 principal in a realm. Additional cryptographic weaknesses in the krb4
34 implementation included in the MIT krb5 distribution permit the use of
35 cut-and-paste attacks to fabricate krb4 tickets for unauthorized
36 client principals if triple-DES keys are used to key krb4 services.
37 These attacks can subvert a site's entire Kerberos authentication
38 infrastructure."
39
40 Read the full advisory at
41 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt
42
43 - From advisory:
44 "Buffer overrun and underrun problems exist in Kerberos principal name
45 handling in unusual cases, such as names with zero components, names
46 with one empty component, or host-based service principal names with
47 no host name component."
48
49 Read the full advisory at
50 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-005-buf.txt
51
52 SOLUTION
53
54 It is recommended that all Gentoo Linux users who are running
55 app-crypt/krb5 and/or app-crypt/mit-krb5 upgrade to krb5-1.2.7-r2 and/or
56 mit-krb5-1.2.7 as follows:
57
58 emerge sync
59 emerge krb5
60 and/or
61 emerge mit-krb5
62 emerge clean
63
64 - - ---------------------------------------------------------------------
65 aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz
66 - - ---------------------------------------------------------------------
67 -----BEGIN PGP SIGNATURE-----
68 Version: GnuPG v1.2.1 (GNU/Linux)
69
70 iD8DBQE+iBH9fT7nyhUpoZMRApoJAJ4riLzN44nYgta6XcEWPUweqCTG8QCeMMCs
71 E+Cyl6Q3Z84+9kZWdJlLAfU=
72 =+CmS
73 -----END PGP SIGNATURE-----