summaryrefslogtreecommitdiff
blob: 2561ac28b618816e8035034184009cab1dde6741 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200904-09">
  <title>MIT Kerberos 5: Multiple vulnerabilities</title>
  <synopsis>
    Multiple vulnerabilities in MIT Kerberos 5 might allow remote
    unauthenticated users to execute arbitrary code with root privileges.
  </synopsis>
  <product type="ebuild">mit-krb5</product>
  <announced>2009-04-08</announced>
  <revised count="01">2009-04-08</revised>
  <bug>262736</bug>
  <bug>263398</bug>
  <access>remote</access>
  <affected>
    <package name="app-crypt/mit-krb5" auto="yes" arch="*">
      <unaffected range="ge">1.6.3-r6</unaffected>
      <vulnerable range="lt">1.6.3-r6</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    MIT Kerberos 5 is a suite of applications that implement the Kerberos
    network protocol. kadmind is the MIT Kerberos 5 administration daemon,
    KDC is the Key Distribution Center.
    </p>
  </background>
  <description>
    <p>
    Multiple vulnerabilities have been reported in MIT Kerberos 5:
    </p>
    <ul>
    <li>A free() call on an uninitialized pointer in the ASN.1 decoder
    when decoding an invalid encoding (CVE-2009-0846).</li>
    <li>A buffer
    overread in the SPNEGO GSS-API application, reported by Apple Product
    Security (CVE-2009-0844).</li>
    <li>A NULL pointer dereference in the
    SPNEGO GSS-API application, reported by Richard Evans
    (CVE-2009-0845).</li>
    <li>An incorrect length check inside an ASN.1
    decoder leading to spurious malloc() failures (CVE-2009-0847).</li>
    </ul>
  </description>
  <impact type="high">
    <p>
    A remote unauthenticated attacker could exploit the first vulnerability
    to cause a Denial of Service or, in unlikely circumstances, execute
    arbitrary code on the host running krb5kdc or kadmind with root
    privileges and compromise the Kerberos key database. Exploitation of
    the other vulnerabilities might lead to a Denial of Service in kadmind,
    krb5kdc, or other daemons performing authorization against Kerberos
    that utilize GSS-API or an information disclosure.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All MIT Kerberos 5 users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.6.3-r6"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844">CVE-2009-0844</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845">CVE-2009-0845</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846">CVE-2009-0846</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847">CVE-2009-0847</uri>
  </references>
  <metadata tag="submitter" timestamp="2009-04-08T01:07:26Z">
    rbu
  </metadata>
  <metadata tag="bugReady" timestamp="2009-04-08T18:19:31Z">
    p-y
  </metadata>
</glsa>