SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   Royal Institute of Technology
(Gentoo Issues Fix) Heimdal Kerberos Cross-Realm Validation Flaw May Permit User Impersonation
SecurityTracker Alert ID:  1009727
SecurityTracker URL:  http://securitytracker.com/id/1009727
CVE Reference:   CVE-2004-0371   (Links to External Site)
Date:  Apr 10 2004
Impact:   Host/resource access via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.6.1 and 0.5.3
Description:   A cross-realm vulnerability was reported in Heimdal Kerberos. A remote user can impersonate another user.

The vendor reported that a user with with control of a Kerberos realm can impersonate any target user in the cross-realm trust path. The software does not properly perform consistency checks on cross-realm requests.

The advisory is available at:

http://www.pdc.kth.se/heimdal/advisory/2004-04-01/

Impact:   A user with with control of a Kerberos realm can impersonate any target user in the cross-realm trust path.
Solution:   Gentoo has released a fix and indicates that all Heimdal users should upgrade to version 0.6.1 or later:

# emerge sync

# emerge -pv ">=app-crypt/heimdal-0.6.1"
# emerge ">=app-crypt/heimdal-0.6.1"

Vendor URL:  www.pdc.kth.se/heimdal/ (Links to External Site)
Cause:   Authentication error
Underlying OS:  Linux (Gentoo)

Message History:   This archive entry is a follow-up to the message listed below.
Apr 2 2004 Heimdal Kerberos Cross-Realm Validation Flaw May Permit User Impersonation



 Source Message Contents

Subject:  [gentoo-announce] [ GLSA 200404-09 ] Cross-realm trust vulnerability in Heimdal



--GJ7e10BhKqIkML+d
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200404-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                             http://security.gentoo.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: Cross-realm trust vulnerability in Heimdal

      Date: April 09, 2004
      Bugs: #46590
        ID: 200404-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=3D=3D=3D=3D=3D=3D=3D=3D

Heimdal contains cross-realm vulnerability allowing someone with
control over a realm to impersonate anyone in the cross-realm trust
path.

Background
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Heimdal is a free implementation of Kerberos 5.

Affected packages
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

    -------------------------------------------------------------------
     Package            /   Vulnerable   /                  Unaffected
    -------------------------------------------------------------------
     app-crypt/heimdal       <=3D 0.6.0                         >=3D 0.6.1

Description
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Heimdal does not properly perform certain consistency checks for
cross-realm requests, which allows remote attackers with control of a
realm to impersonate others in the cross-realm trust path.

Impact
=3D=3D=3D=3D=3D=3D

Remote attackers with control of a realm may be able to impersonate
other users in the cross-realm trust path.

Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A workaround is not currently known for this issue. All users are
advised to upgrade to the latest version of the affected package.

Resolution
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Heimdal users should upgrade to version 0.6.1 or later:

    # emerge sync

    # emerge -pv ">=3Dapp-crypt/heimdal-0.6.1"
    # emerge ">=3Dapp-crypt/heimdal-0.6.1"

References
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  [ 1 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2004-0371

Concerns?
=3D=3D=3D=3D=3D=3D=3D=3D=3D

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

Availability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

     http://security.gentoo.org/glsa/glsa-200404-09.xml

Copyright/License
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Copyright 2004 Gentoo Technologies, Inc.=20

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0

--GJ7e10BhKqIkML+d
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFAdoAyJPpRNiftIEYRAr7dAJ45MHxTbpgAGoI9lD8eCNt5U8YQWwCcCwGt
2SrGLX8tL63RcNbHRm0bHP0=
=4QiH
-----END PGP SIGNATURE-----

--GJ7e10BhKqIkML+d--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC