Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:0290-1

Опубликовано: 21 янв. 2015
Источник: suse-cvrf

Описание

Security update for krb5

MIT kerberos krb5 was updated to fix several security issues and bugs.

Security issues fixed: CVE-2014-5351: The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) sent old keys in a response to a -randkey -keepold request, which allowed remote authenticated users to forge tickets by leveraging administrative access.

CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library, after gss_process_context_token() is used to process a valid context deletion token, the caller was left with a security context handle containing a dangling pointer. Further uses of this handle would have resulted in use-after-free and double-free memory access violations. libgssrpc server applications such as kadmind were vulnerable as they can be instructed to call gss_process_context_token().

CVE-2014-9421: If the MIT krb5 kadmind daemon receives invalid XDR data from an authenticated user, it may have performed use-after-free and double-free memory access violations while cleaning up the partial deserialization results. Other libgssrpc server applications might also been vulnerable if they contain insufficiently defensive XDR functions.

CVE-2014-9422: The MIT krb5 kadmind daemon incorrectly accepted authentications to two-component server principals whose first component is a left substring of 'kadmin' or whose realm is a left prefix of the default realm.

CVE-2014-9423: libgssrpc applications including kadmind output four or eight bytes of uninitialized memory to the network as part of an unused 'handle' field in replies to clients.

Bugs fixed:

  • Work around replay cache creation race; (bnc#898439).

Список пакетов

SUSE Linux Enterprise Server 12
krb5-1.12.1-9.1
krb5-32bit-1.12.1-9.1
krb5-client-1.12.1-9.1
krb5-doc-1.12.1-9.1
krb5-plugin-kdb-ldap-1.12.1-9.1
krb5-plugin-preauth-otp-1.12.1-9.1
krb5-plugin-preauth-pkinit-1.12.1-9.1
krb5-server-1.12.1-9.1
SUSE Linux Enterprise Server for SAP Applications 12
krb5-1.12.1-9.1
krb5-32bit-1.12.1-9.1
krb5-client-1.12.1-9.1
krb5-doc-1.12.1-9.1
krb5-plugin-kdb-ldap-1.12.1-9.1
krb5-plugin-preauth-otp-1.12.1-9.1
krb5-plugin-preauth-pkinit-1.12.1-9.1
krb5-server-1.12.1-9.1
SUSE Linux Enterprise Software Development Kit 12
krb5-devel-1.12.1-9.1

Описание

The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1

Ссылки

Описание

The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1

Ссылки

Описание

The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1

Ссылки

Описание

The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1

Ссылки

Описание

The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-9.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-9.1

Ссылки
Уязвимость SUSE-SU-2015:0290-1