SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
MIT krb5 KDC Buffer Overflow in 'do_as_req' and 'do_tgs_req' May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1014460
SecurityTracker URL:  http://securitytracker.com/id/1014460
CVE Reference:   CVE-2005-1174, CVE-2005-1175   (Links to External Site)
Updated:  Jun 1 2006
Original Entry Date:  Jul 12 2005
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): krb5-1.4.1 and prior versions
Description:   Two vulnerabilities were reported in the MIT krb5 Key Distribution Center (KDC) implementation. A remote user may be able to execute arbitrary code on the target system.

A remote user can send a specially crafted TCP connection to cause the KDC to attempt to free random memory and corrupt the heap [CVE: CVE-2005-1174]. This can cause denial of service conditions. Systems that accept TCP connections are affected.

A remote user can send the same kind of request via TCP or UDP to trigger a single-byte heap overflow [CVE: CVE-2005-1175]. The remote user may be able to execute arbitrary code.

The vendor reports that exploitation of these vulnerabilities is believed to be difficult.

The vulnerabilities reside in kdc/do_as_req.c' and 'kdc/do_tgs_req.c'.

The vendor credits Daniel Wachdorf with reporting these vulnerabilities.

Impact:   A remote user may be able to execute arbitrary code on the KDC host, potentially compromising an entire Kerberos realm.
Solution:   The vendor is releasing a fixed version (krb5-1.4.2), available at:

http://web.mit.edu/kerberos/index.html

Also, the following patch is available:

http://web.mit.edu/kerberos/advisories/2005-002-patch_1.4.1.txt

Sun has issued a fix for Sun Solaris:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1

Vendor URL:  web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 12 2005 (Red Hat Issues Fix) MIT krb5 KDC Buffer Overflow in 'do_as_req' and 'do_tgs_req' May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix.
Jul 12 2005 (Red Hat Issues Fix) MIT krb5 KDC Buffer Overflow in 'do_as_req' and 'do_tgs_req' May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix.
Jul 13 2005 (Sun Issues Fix) MIT krb5 KDC Buffer Overflow in 'do_as_req' and 'do_tgs_req' May Let Remote Users Execute Arbitrary Code
Sun has issued a final fix.
Aug 16 2005 (Apple Issues Fix) MIT krb5 KDC Buffer Overflow in 'do_as_req' and 'do_tgs_req' May Let Remote Users Execute Arbitrary Code
Apple has issued a fix for Mac OS X 10.4.2.
Jun 1 2006 (IBM Issues Fix for IBM DCE) MIT krb5 KDC Buffer Overflow in 'do_as_req' and 'do_tgs_req' May Let Remote Users Execute Arbitrary Code
IBM has issued a fix for IBM DCE.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC