Gentoo Logo

MIT krb5: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200409-09 / mit-krb5
Release Date September 06, 2004
Latest Revision September 06, 2004: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-crypt/mit-krb5 < 1.3.4 >= 1.3.4 All supported architectures

Related bugreports: #62417

Synopsis

MIT krb5 contains several double-free vulnerabilities, potentially allowing the execution of arbitrary code, as well as a denial of service vulnerability.

2.  Impact Information

Background

MIT krb5 is the free implementation of the Kerberos network authentication protocol by the Massachusetts Institute of Technology.

Description

The implementation of the Key Distribution Center (KDC) and the MIT krb5 library contain double-free vulnerabilities, making client programs as well as application servers vulnerable.

The ASN.1 decoder library is vulnerable to a denial of service attack, including the KDC.

Impact

The double-free vulnerabilities could allow an attacker to execute arbitrary code on a KDC host and hosts running krb524d or vulnerable services. In the case of a KDC host, this can lead to a compromise of the entire Kerberos realm. Furthermore, an attacker impersonating a legitimate KDC or application server can potentially execute arbitrary code on authenticating clients.

An attacker can cause a denial of service for a KDC or application server and clients, the latter if impersonating a legitimate KDC or application server.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All mit-krb5 users should upgrade to the latest stable version:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=app-crypt/mit-krb5-1.3.4"
# emerge ">=app-crypt/mit-krb5-1.3.4"

4.  References



Print

Page updated September 06, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.