GLSA: krb5 & mit-krb5 (200303-28)

From: Daniel Ahlberg (alizat_private)
Date: Mon Mar 31 2003 - 02:01:41 PST

  • Next message: Immunix Security Team: "[Immunix-announce] Immunix Secured OS 7+ openssl update"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - ---------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200303-28
    - - ---------------------------------------------------------------------
    
              PACKAGE : krb5 & mit-krb5
              SUMMARY : multiple vulnerabilities fixed
                 DATE : 2003-03-31 10:01 UTC
              EXPLOIT : remote
    VERSIONS AFFECTED : krb5: <1.2.7-r2 mit-krb5: <1.2.7 
        FIXED VERSION : krb5: >=1.2.7-r2 mit-krb5: >=1.2.7
                  CVE : CAN-2003-0139 CAN-2003-0138 CAN-2003-0082 
                        CAN-2003-0072 CAN-2003-0028
    
    - - ---------------------------------------------------------------------
    
    - From advisory:
    "An attacker who has successfully authenticated to the Kerberos
    administration daemon (kadmind) may be able to crash kadmind or induce
    it to leak sensitive information, such as secret keys.  For the attack
    to succeed, it is believed that the configuration of the kadmind
    installation must allow it to successfully allocate more than INT_MAX
    bytes of memory."
    
    Read the full advisory at
    http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-003-xdr.txt
    
    - From advisory:
    "A cryptographic weakness in version 4 of the Kerberos protocol allows
    an attacker to use a chosen-plaintext attack to impersonate any
    principal in a realm.  Additional cryptographic weaknesses in the krb4
    implementation included in the MIT krb5 distribution permit the use of
    cut-and-paste attacks to fabricate krb4 tickets for unauthorized
    client principals if triple-DES keys are used to key krb4 services.
    These attacks can subvert a site's entire Kerberos authentication
    infrastructure."
    
    Read the full advisory at
    http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt
    
    - From advisory:
    "Buffer overrun and underrun problems exist in Kerberos principal name
    handling in unusual cases, such as names with zero components, names
    with one empty component, or host-based service principal names with
    no host name component."
    
    Read the full advisory at
    http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-005-buf.txt
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    app-crypt/krb5 and/or app-crypt/mit-krb5 upgrade to krb5-1.2.7-r2 and/or
    mit-krb5-1.2.7 as follows:
    
    emerge sync
    emerge krb5
    and/or
    emerge mit-krb5
    emerge clean
    
    - - ---------------------------------------------------------------------
    alizat_private - GnuPG key is available at http://cvs.gentoo.org/~aliz
    - - ---------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQE+iBH9fT7nyhUpoZMRApoJAJ4riLzN44nYgta6XcEWPUweqCTG8QCeMMCs
    E+Cyl6Q3Z84+9kZWdJlLAfU=
    =+CmS
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Mar 31 2003 - 16:59:52 PST