SCIENTIFIC-LINUX-ERRATA Archives

November 2014

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 3 Nov 2014 17:54:21 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (63 lines)
Synopsis:          Moderate: krb5 security and bug fix update
Advisory ID:       SLSA-2014:1389-2
Issue Date:        2014-10-14
CVE Numbers:       CVE-2013-1418
                   CVE-2013-6800
                   CVE-2014-4341
                   CVE-2014-4344
                   CVE-2014-4345
                   CVE-2014-4342
                   CVE-2014-4343
--

It was found that if a KDC served multiple realms, certain requests could
cause the setup_server_realm() function to dereference a NULL pointer. A
remote, unauthenticated attacker could use this flaw to crash the KDC
using a specially crafted request. (CVE-2013-1418, CVE-2013-6800)

A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO
acceptor for continuation tokens. A remote, unauthenticated attacker could
use this flaw to crash a GSSAPI-enabled server application.
(CVE-2014-4344)

A buffer overflow was found in the KADM5 administration server (kadmind)
when it was used with an LDAP back end for the KDC database. A remote,
authenticated attacker could potentially use this flaw to execute
arbitrary code on the system running kadmind. (CVE-2014-4345)

Two buffer over-read flaws were found in the way MIT Kerberos handled
certain requests. A remote, unauthenticated attacker who is able to inject
packets into a client or server application's GSSAPI session could use
either of these flaws to crash the application. (CVE-2014-4341,
CVE-2014-4342)

A double-free flaw was found in the MIT Kerberos SPNEGO initiators. An
attacker able to spoof packets to appear as though they are from an GSSAPI
acceptor could use this flaw to crash a client application that uses MIT
Kerberos. (CVE-2014-4343)
--

SL6
  x86_64
    krb5-debuginfo-1.10.3-33.el6.i686.rpm
    krb5-debuginfo-1.10.3-33.el6.x86_64.rpm
    krb5-libs-1.10.3-33.el6.i686.rpm
    krb5-libs-1.10.3-33.el6.x86_64.rpm
    krb5-pkinit-openssl-1.10.3-33.el6.x86_64.rpm
    krb5-workstation-1.10.3-33.el6.x86_64.rpm
    krb5-devel-1.10.3-33.el6.i686.rpm
    krb5-devel-1.10.3-33.el6.x86_64.rpm
    krb5-server-1.10.3-33.el6.x86_64.rpm
    krb5-server-ldap-1.10.3-33.el6.i686.rpm
    krb5-server-ldap-1.10.3-33.el6.x86_64.rpm
  i386
    krb5-debuginfo-1.10.3-33.el6.i686.rpm
    krb5-libs-1.10.3-33.el6.i686.rpm
    krb5-pkinit-openssl-1.10.3-33.el6.i686.rpm
    krb5-workstation-1.10.3-33.el6.i686.rpm
    krb5-devel-1.10.3-33.el6.i686.rpm
    krb5-server-1.10.3-33.el6.i686.rpm
    krb5-server-ldap-1.10.3-33.el6.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2