Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:1276-1

Опубликовано: 14 июл. 2015
Источник: suse-cvrf

Описание

Security update for krb5

krb5 was updated to fix four security issues.

These security issues were fixed:

  • CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
  • CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
  • CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
  • CVE-2015-2694: OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass (bsc#928978).

Список пакетов

SUSE Linux Enterprise Server 12
krb5-1.12.1-16.1
krb5-32bit-1.12.1-16.1
krb5-client-1.12.1-16.1
krb5-doc-1.12.1-16.1
krb5-plugin-kdb-ldap-1.12.1-16.1
krb5-plugin-preauth-otp-1.12.1-16.1
krb5-plugin-preauth-pkinit-1.12.1-16.1
krb5-server-1.12.1-16.1
SUSE Linux Enterprise Server for SAP Applications 12
krb5-1.12.1-16.1
krb5-32bit-1.12.1-16.1
krb5-client-1.12.1-16.1
krb5-doc-1.12.1-16.1
krb5-plugin-kdb-ldap-1.12.1-16.1
krb5-plugin-preauth-otp-1.12.1-16.1
krb5-plugin-preauth-pkinit-1.12.1-16.1
krb5-server-1.12.1-16.1
SUSE Linux Enterprise Software Development Kit 12
krb5-devel-1.12.1-16.1

Описание

The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-16.1

Ссылки

Описание

plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-16.1

Ссылки

Описание

MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-16.1

Ссылки

Описание

The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.


Затронутые продукты
SUSE Linux Enterprise Server 12:krb5-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-32bit-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-client-1.12.1-16.1
SUSE Linux Enterprise Server 12:krb5-doc-1.12.1-16.1

Ссылки