SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(Sun Issues Interim Fix) Kerberos AES and RC4 Integer Underflow May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1023453
SecurityTracker URL:  http://securitytracker.com/id/1023453
CVE Reference:   CVE-2009-4212   (Links to External Site)
Date:  Jan 13 2010
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5-1.3 to 5-1.6.4, 5-1.7
Description:   A vulnerability was reported in Kerberos. A remote user may be able to execute arbitrary code on the target system.

A remote user can send specially crafted ciphertext data to trigger an integer overflow in the AES and RC4 decryption operations of the MIT Kerberos crypto library and potentially execute arbitrary code on the target system. The code will run with the privileges of the target service.

Impact:   A remote user can execute arbitrary code on the target system or cause the target system to crash.
Solution:   Sun has issued Interim Security Relief (ISR) patches, available at:

http://sunsolve.sun.com/tpatches

SPARC Platform

* Solaris 10 IDR143817-01

x86 Platform

* Solaris 10 IDR143818-01

The Sun advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-275530-1

Vendor URL:  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt (Links to External Site)
Cause:   Boundary error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  10, OpenSolaris

Message History:   This archive entry is a follow-up to the message listed below.
Jan 12 2010 Kerberos AES and RC4 Integer Underflow May Let Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC