SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(Red Hat Issues Fix) Kerberos Kadmind Null Pointer Dereference in process_db_args() Lets Remote Authenticated Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1037202
SecurityTracker URL:  http://securitytracker.com/id/1037202
CVE Reference:   CVE-2016-3119   (Links to External Site)
Date:  Nov 4 2016
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Kerberos. A remote authenticated user can execute arbitrary code on the target system.

A remote authenticated user can send a specially crafted modify_principal command with an empty DB argument to trigger a null pointer dereference in process_db_args() and execute arbitrary code on the target system.

Systems configured to use the LDAP Kerberos data interface module are affected.

Impact:   A remote authenticated user can execute arbitrary code on the target system.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2016-2591.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2016-2591.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Mar 24 2016 Kerberos Kadmind Null Pointer Dereference in process_db_args() Lets Remote Authenticated Users Execute Arbitrary Code on the Target System



 Source Message Contents

Subject:  [RHSA-2016:2591-02] Low: krb5 security, bug fix, and enhancement update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: krb5 security, bug fix, and enhancement update
Advisory ID:       RHSA-2016:2591-02
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2016-2591.html
Issue date:        2016-11-03
CVE Names:         CVE-2016-3119 CVE-2016-3120 
=====================================================================

1. Summary:

An update for krb5 is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

Kerberos is a network authentication system, which can improve the security
of your network by eliminating the insecure practice of sending passwords
over the network in unencrypted form. It allows clients and servers to
authenticate to each other with the help of a trusted third party, the
Kerberos key distribution center (KDC).

The following packages have been upgraded to a newer upstream version: krb5
(1.14.1). (BZ#1292153)

Security Fix(es):

* A NULL pointer dereference flaw was found in MIT Kerberos kadmind
service. An authenticated attacker with permission to modify a principal
entry could use this flaw to cause kadmind to dereference a null pointer
and crash by supplying an empty DB argument to the modify_principal
command, if kadmind was configured to use the LDAP KDB module.
(CVE-2016-3119)

* A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc
service. An authenticated attacker could use this flaw to cause krb5kdc to
dereference a null pointer and crash by making an S4U2Self request, if the
restrict_anonymous_to_tgt option was set to true. (CVE-2016-3120)

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, running Kerberos services (krb5kdc,
kadmin, and kprop) will be restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1135427 - kadmin.local -q with wrong value in -e option doesn't return nonzero  return code
1146945 - RFE: Kerberos should support dropping configuration snippets to /etc/ and /usr
1183058 - krb5-server requires systemd-sysv when it shouldn't need to
1247261 - ksu asks for password even if called by root
1256735 - krb5kdc.log file is world-readable on IPA
1283902 - Remove krb5-server dependency on initscripts unless it is needed
1284987 - Please backport fix for interposer
1290239 - Update krb5 spec file with changes made in fedora
1292153 - Rebase krb5 to 1.14.x
1296241 - Chrome crash in spnego_gss_inquire_context()
1297591 - [backport] Fix some uses of installed files in the test suite
1313457 - krb5 selinux patch leaks memory
1314493 - Skip unnecessary mech calls in gss_inquire_cred
1319616 - CVE-2016-3119 krb5: null pointer dereference in kadmin
1340304 - otp module incorrectly overwrites as_key
1349042 - Incorrect length calculation in libkrad
1361050 - CVE-2016-3120 krb5: S4U2Self KDC crash when anon is restricted
1363690 - ssh login permission denied when ldap/krb5 is enabled via authconfig
1364993 - MS-KKDCP with TLS SNI requires HTTP Host header

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
krb5-1.14.1-26.el7.src.rpm

x86_64:
krb5-debuginfo-1.14.1-26.el7.i686.rpm
krb5-debuginfo-1.14.1-26.el7.x86_64.rpm
krb5-libs-1.14.1-26.el7.i686.rpm
krb5-libs-1.14.1-26.el7.x86_64.rpm
krb5-pkinit-1.14.1-26.el7.x86_64.rpm
krb5-workstation-1.14.1-26.el7.x86_64.rpm
libkadm5-1.14.1-26.el7.i686.rpm
libkadm5-1.14.1-26.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
krb5-debuginfo-1.14.1-26.el7.i686.rpm
krb5-debuginfo-1.14.1-26.el7.x86_64.rpm
krb5-devel-1.14.1-26.el7.i686.rpm
krb5-devel-1.14.1-26.el7.x86_64.rpm
krb5-server-1.14.1-26.el7.x86_64.rpm
krb5-server-ldap-1.14.1-26.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
krb5-1.14.1-26.el7.src.rpm

x86_64:
krb5-debuginfo-1.14.1-26.el7.i686.rpm
krb5-debuginfo-1.14.1-26.el7.x86_64.rpm
krb5-libs-1.14.1-26.el7.i686.rpm
krb5-libs-1.14.1-26.el7.x86_64.rpm
krb5-pkinit-1.14.1-26.el7.x86_64.rpm
krb5-workstation-1.14.1-26.el7.x86_64.rpm
libkadm5-1.14.1-26.el7.i686.rpm
libkadm5-1.14.1-26.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64:
krb5-debuginfo-1.14.1-26.el7.i686.rpm
krb5-debuginfo-1.14.1-26.el7.x86_64.rpm
krb5-devel-1.14.1-26.el7.i686.rpm
krb5-devel-1.14.1-26.el7.x86_64.rpm
krb5-server-1.14.1-26.el7.x86_64.rpm
krb5-server-ldap-1.14.1-26.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
krb5-1.14.1-26.el7.src.rpm

aarch64:
krb5-debuginfo-1.14.1-26.el7.aarch64.rpm
krb5-devel-1.14.1-26.el7.aarch64.rpm
krb5-libs-1.14.1-26.el7.aarch64.rpm
krb5-pkinit-1.14.1-26.el7.aarch64.rpm
krb5-server-1.14.1-26.el7.aarch64.rpm
krb5-server-ldap-1.14.1-26.el7.aarch64.rpm
krb5-workstation-1.14.1-26.el7.aarch64.rpm
libkadm5-1.14.1-26.el7.aarch64.rpm

ppc64:
krb5-debuginfo-1.14.1-26.el7.ppc.rpm
krb5-debuginfo-1.14.1-26.el7.ppc64.rpm
krb5-devel-1.14.1-26.el7.ppc.rpm
krb5-devel-1.14.1-26.el7.ppc64.rpm
krb5-libs-1.14.1-26.el7.ppc.rpm
krb5-libs-1.14.1-26.el7.ppc64.rpm
krb5-pkinit-1.14.1-26.el7.ppc64.rpm
krb5-server-1.14.1-26.el7.ppc64.rpm
krb5-server-ldap-1.14.1-26.el7.ppc64.rpm
krb5-workstation-1.14.1-26.el7.ppc64.rpm
libkadm5-1.14.1-26.el7.ppc.rpm
libkadm5-1.14.1-26.el7.ppc64.rpm

ppc64le:
krb5-debuginfo-1.14.1-26.el7.ppc64le.rpm
krb5-devel-1.14.1-26.el7.ppc64le.rpm
krb5-libs-1.14.1-26.el7.ppc64le.rpm
krb5-pkinit-1.14.1-26.el7.ppc64le.rpm
krb5-server-1.14.1-26.el7.ppc64le.rpm
krb5-server-ldap-1.14.1-26.el7.ppc64le.rpm
krb5-workstation-1.14.1-26.el7.ppc64le.rpm
libkadm5-1.14.1-26.el7.ppc64le.rpm

s390x:
krb5-debuginfo-1.14.1-26.el7.s390.rpm
krb5-debuginfo-1.14.1-26.el7.s390x.rpm
krb5-devel-1.14.1-26.el7.s390.rpm
krb5-devel-1.14.1-26.el7.s390x.rpm
krb5-libs-1.14.1-26.el7.s390.rpm
krb5-libs-1.14.1-26.el7.s390x.rpm
krb5-pkinit-1.14.1-26.el7.s390x.rpm
krb5-server-1.14.1-26.el7.s390x.rpm
krb5-server-ldap-1.14.1-26.el7.s390x.rpm
krb5-workstation-1.14.1-26.el7.s390x.rpm
libkadm5-1.14.1-26.el7.s390.rpm
libkadm5-1.14.1-26.el7.s390x.rpm

x86_64:
krb5-debuginfo-1.14.1-26.el7.i686.rpm
krb5-debuginfo-1.14.1-26.el7.x86_64.rpm
krb5-devel-1.14.1-26.el7.i686.rpm
krb5-devel-1.14.1-26.el7.x86_64.rpm
krb5-libs-1.14.1-26.el7.i686.rpm
krb5-libs-1.14.1-26.el7.x86_64.rpm
krb5-pkinit-1.14.1-26.el7.x86_64.rpm
krb5-server-1.14.1-26.el7.x86_64.rpm
krb5-server-ldap-1.14.1-26.el7.x86_64.rpm
krb5-workstation-1.14.1-26.el7.x86_64.rpm
libkadm5-1.14.1-26.el7.i686.rpm
libkadm5-1.14.1-26.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
krb5-1.14.1-26.el7.src.rpm

x86_64:
krb5-debuginfo-1.14.1-26.el7.i686.rpm
krb5-debuginfo-1.14.1-26.el7.x86_64.rpm
krb5-devel-1.14.1-26.el7.i686.rpm
krb5-devel-1.14.1-26.el7.x86_64.rpm
krb5-libs-1.14.1-26.el7.i686.rpm
krb5-libs-1.14.1-26.el7.x86_64.rpm
krb5-pkinit-1.14.1-26.el7.x86_64.rpm
krb5-server-1.14.1-26.el7.x86_64.rpm
krb5-server-ldap-1.14.1-26.el7.x86_64.rpm
krb5-workstation-1.14.1-26.el7.x86_64.rpm
libkadm5-1.14.1-26.el7.i686.rpm
libkadm5-1.14.1-26.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-3119
https://access.redhat.com/security/cve/CVE-2016-3120
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFYGvx5XlSAg2UNWIIRAtn9AKCzh2AG4sbXP0rFyreW+sckElGIOwCfTpxf
WDRdPzykDNjqeMMinr7XmWM=
=Uv3r
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC