Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:1088-1

Опубликовано: 18 апр. 2016
Источник: suse-cvrf

Описание

Security update for krb5

This update for krb5 fixes the following security issue:

  • CVE-2016-3119: An authenticated attacker with permission to modify a principal entry could have caused kadmind to dereference a null pointer by supplying an empty DB argument to the modify_principal command, if kadmind is configured to use the LDAP KDB module. (bsc#971942)

Список пакетов

SUSE Linux Enterprise Server 11 SP4
krb5-1.6.3-133.49.109.1
krb5-32bit-1.6.3-133.49.109.1
krb5-apps-clients-1.6.3-133.49.109.1
krb5-apps-servers-1.6.3-133.49.109.1
krb5-client-1.6.3-133.49.109.1
krb5-server-1.6.3-133.49.109.1
krb5-x86-1.6.3-133.49.109.1
SUSE Linux Enterprise Server for SAP Applications 11 SP4
krb5-1.6.3-133.49.109.1
krb5-32bit-1.6.3-133.49.109.1
krb5-apps-clients-1.6.3-133.49.109.1
krb5-apps-servers-1.6.3-133.49.109.1
krb5-client-1.6.3-133.49.109.1
krb5-server-1.6.3-133.49.109.1
krb5-x86-1.6.3-133.49.109.1
SUSE Linux Enterprise Software Development Kit 11 SP4
krb5-devel-1.6.3-133.49.109.1
krb5-devel-32bit-1.6.3-133.49.109.1
krb5-server-1.6.3-133.49.109.1

Описание

The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:krb5-1.6.3-133.49.109.1
SUSE Linux Enterprise Server 11 SP4:krb5-32bit-1.6.3-133.49.109.1
SUSE Linux Enterprise Server 11 SP4:krb5-apps-clients-1.6.3-133.49.109.1
SUSE Linux Enterprise Server 11 SP4:krb5-apps-servers-1.6.3-133.49.109.1

Ссылки