Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200803-31 ] MIT Kerberos 5: Multiple vulnerabilities
Date: Mon, 24 Mar 2008 19:43:25
Message-Id: 200803242037.31974.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200803-31
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: MIT Kerberos 5: Multiple vulnerabilities
9 Date: March 24, 2008
10 Bugs: #199205, #212363
11 ID: 200803-31
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilites have been found in MIT Kerberos 5, which could
19 allow a remote unauthenticated user to execute arbitrary code with root
20 privileges.
21
22 Background
23 ==========
24
25 MIT Kerberos 5 is a suite of applications that implement the Kerberos
26 network protocol. kadmind is the MIT Kerberos 5 administration daemon,
27 KDC is the Key Distribution Center.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 app-crypt/mit-krb5 < 1.6.3-r1 >= 1.6.3-r1
36
37 Description
38 ===========
39
40 * Two vulnerabilities were found in the Kerberos 4 support in KDC: A
41 global variable is not set for some incoming message types, leading
42 to a NULL pointer dereference or a double free() (CVE-2008-0062) and
43 unused portions of a buffer are not properly cleared when generating
44 an error message, which results in stack content being contained in a
45 reply (CVE-2008-0063).
46
47 * Jeff Altman (Secure Endpoints) discovered a buffer overflow in the
48 RPC library server code, used in the kadmin server, caused when too
49 many file descriptors are opened (CVE-2008-0947).
50
51 * Venustech AD-LAB discovered multiple vulnerabilities in the GSSAPI
52 library: usage of a freed variable in the gss_indicate_mechs()
53 function (CVE-2007-5901) and a double free() vulnerability in the
54 gss_krb5int_make_seal_token_v3() function (CVE-2007-5971).
55
56 Impact
57 ======
58
59 The first two vulnerabilities can be exploited by a remote
60 unauthenticated attacker to execute arbitrary code on the host running
61 krb5kdc, compromise the Kerberos key database or cause a Denial of
62 Service. These bugs can only be triggered when Kerberos 4 support is
63 enabled.
64
65 The RPC related vulnerability can be exploited by a remote
66 unauthenticated attacker to crash kadmind, and theoretically execute
67 arbitrary code with root privileges or cause database corruption. This
68 bug can only be triggered in configurations that allow large numbers of
69 open file descriptors in a process.
70
71 The GSSAPI vulnerabilities could be exploited by a remote attacker to
72 cause Denial of Service conditions or possibly execute arbitrary code.
73
74 Workaround
75 ==========
76
77 Kerberos 4 support can be disabled via disabling the "krb4" USE flag
78 and recompiling the ebuild, or setting "v4_mode=none" in the
79 [kdcdefaults] section of /etc/krb5/kdc.conf. This will only work around
80 the KDC related vulnerabilities.
81
82 Resolution
83 ==========
84
85 All MIT Kerberos 5 users should upgrade to the latest version:
86
87 # emerge --sync
88 # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.6.3-r1"
89
90 References
91 ==========
92
93 [ 1 ] CVE-2007-5901
94 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894
95 [ 2 ] CVE-2007-5971
96 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971
97 [ 3 ] CVE-2008-0062
98 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
99 [ 4 ] CVE-2008-0063
100 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
101 [ 5 ] CVE-2008-0947
102 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947
103
104 Availability
105 ============
106
107 This GLSA and any updates to it are available for viewing at
108 the Gentoo Security Website:
109
110 http://security.gentoo.org/glsa/glsa-200803-31.xml
111
112 Concerns?
113 =========
114
115 Security is a primary focus of Gentoo Linux and ensuring the
116 confidentiality and security of our users machines is of utmost
117 importance to us. Any security concerns should be addressed to
118 security@g.o or alternatively, you may file a bug at
119 http://bugs.gentoo.org.
120
121 License
122 =======
123
124 Copyright 2008 Gentoo Foundation, Inc; referenced text
125 belongs to its owner(s).
126
127 The contents of this document are licensed under the
128 Creative Commons - Attribution / Share Alike license.
129
130 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature