LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 26th, 2014
Linux Security Week: September 22nd, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Red Hat: krb5 Buffer overflow vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux Updated Kerberos 5 (krb5) packages which correct buffer overflows in the krb5_aname_to_localname function are now available.

Red Hat Security Advisory

Synopsis:          Updated krb5 packages available
Advisory ID:       RHSA-2004:236-01
Issue date:        2004-06-09
Updated on:        2004-06-09
Product:           Red Hat Enterprise Linux
Keywords:          krb5 auth_to_local MITKRB5-SA-2004-001
Cross references:  
Obsoletes:         RHBA-2004:208
CVE Names:         CAN-2004-0523
- ---------------------------------------------------------------------

1. Topic:

Updated Kerberos 5 (krb5) packages which correct buffer overflows in the
krb5_aname_to_localname function are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, ppc64, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Kerberos is a network authentication system.

Bugs have been fixed in the krb5_aname_to_localname library function.
Specifically, buffer overflows were possible for all Kerberos versions up
to and including 1.3.3. The krb5_aname_to_localname function translates a
Kerberos principal name to a local account name, typically a UNIX username.
This function is frequently used when performing authorization checks.

If configured with mappings from particular Kerberos principals to
particular UNIX user names, certain functions called by
krb5_aname_to_localname will not properly check the lengths of buffers
used to store portions of the principal name.  If configured to map
principals to user names using rules, krb5_aname_to_localname would
consistently write one byte past the end of a buffer allocated from the
heap.  The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0523 to this issue.

Only configurations which enable the explicit mapping or rules-based
mapping functionality of krb5_aname_to_localname() are vulnerable.
These configurations are not the default.

Users of Kerberos are advised to upgrade to these erratum packages which
contain backported security patches to correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed  (http://bugzilla.redhat.com/bugzilla for more info):

125001 - CAN-2004-0523 MIT Kerberos 5: buffer overflows in krb5_aname_to_localname

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/krb5-1.2.2-27.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.i386.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/krb5-1.2.2-27.src.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/krb5-1.2.2-27.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/krb5-1.2.2-27.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/krb5-1.2.7-24.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.i386.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.ia64.rpm

ppc:
Available from Red Hat Network: krb5-devel-1.2.7-24.ppc.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.ppc.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.ppc.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.ppc.rpm

ppc64:
Available from Red Hat Network: krb5-libs-1.2.7-24.ppc64.rpm

s390:
Available from Red Hat Network: krb5-devel-1.2.7-24.s390.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.s390.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.s390.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.s390.rpm

s390x:
Available from Red Hat Network: krb5-devel-1.2.7-24.s390x.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.s390x.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.s390.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.s390x.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.s390x.rpm

x86_64:
Available from Red Hat Network: krb5-devel-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.x86_64.rpm

Red Hat Desktop version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/krb5-1.2.7-24.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.i386.rpm

x86_64:
Available from Red Hat Network: krb5-devel-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/krb5-1.2.7-24.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.i386.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.ia64.rpm

x86_64:
Available from Red Hat Network: krb5-devel-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/krb5-1.2.7-24.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.i386.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.ia64.rpm

x86_64:
Available from Red Hat Network: krb5-devel-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.x86_64.rpm



7. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------
3d02725d161f02d01ff86ef7b7182183 krb5-1.2.2-27.src.rpm
af63a6f3ffd39b302760c87fcad4266e krb5-1.2.7-24.src.rpm
3bc07d36495e716f02a27744853e2076 krb5-devel-1.2.2-27.i386.rpm
168a5eeb5037510af1fbb5ec62228466 krb5-devel-1.2.2-27.ia64.rpm
6d6afcdbf68274e0e17d1febc8b4cbbc krb5-devel-1.2.7-24.i386.rpm
a5fb83189f17bce330979183c1adf258 krb5-devel-1.2.7-24.ia64.rpm
a9b7d213f7063478841d3fbb81815812 krb5-devel-1.2.7-24.ppc.rpm
8f328bf8938322b57587819a3f28ff46 krb5-devel-1.2.7-24.s390.rpm
16acea014099bc8bc972e4c93190a202 krb5-devel-1.2.7-24.s390x.rpm
579783ee3caafeb629c76e1f17fb6b36 krb5-devel-1.2.7-24.x86_64.rpm
3f3d659e6a39aadf75b0d199a1785075 krb5-libs-1.2.2-27.i386.rpm
e6d7cd9a27c55e3e764556595d6d9b3a krb5-libs-1.2.2-27.ia64.rpm
348a5fe692a60dd6fb53cf926ca1a67a krb5-libs-1.2.7-24.i386.rpm
a836bc89fab21b87c2671a38376060c8 krb5-libs-1.2.7-24.ia64.rpm
dc8412ef9ff911cb3c0203dda9757acd krb5-libs-1.2.7-24.ppc.rpm
d5e94f1dd96b7b9adf0063d8bf3f6a68 krb5-libs-1.2.7-24.ppc64.rpm
3ebad1dba1ef6be35c42944ec0e3b374 krb5-libs-1.2.7-24.s390.rpm
4dadbf79a6f406bc219d8794c20f61e0 krb5-libs-1.2.7-24.s390x.rpm
c61c3221a56d5603e6e4e1ec9ddaf380 krb5-libs-1.2.7-24.x86_64.rpm
ef93cca932fb036e44fb3aeaf5f72a7a krb5-server-1.2.2-27.i386.rpm
5e756234b865a2a6539c29fe0baeab88 krb5-server-1.2.2-27.ia64.rpm
0f31a82ed0046a3fbe50bf1d4ac05948 krb5-server-1.2.7-24.i386.rpm
f882e7d17c37f242afb32aaf7c34c0b9 krb5-server-1.2.7-24.ia64.rpm
ee76eced813fce598c895c75743f1a34 krb5-server-1.2.7-24.ppc.rpm
23d8d0c047508e5598fd6417e461c61b krb5-server-1.2.7-24.s390.rpm
86c9d73665948640d90915f4665ae2b0 krb5-server-1.2.7-24.s390x.rpm
e9cef6200f186a4118da041cf56fe6f7 krb5-server-1.2.7-24.x86_64.rpm
2a2743270d3fe988624d55a0e254f380 krb5-workstation-1.2.2-27.i386.rpm
fa5fdeef9726022e788d5ff02a9e2c49 krb5-workstation-1.2.2-27.ia64.rpm
54deedb77213b98088601db3c91c5136 krb5-workstation-1.2.7-24.i386.rpm
9e2b7bad03c8f0c4dbda226aad2edaa7 krb5-workstation-1.2.7-24.ia64.rpm
a8f191915064110e4f3c072f831aca0b krb5-workstation-1.2.7-24.ppc.rpm
ff7ec2de33ee8084384be8ae53d285ab krb5-workstation-1.2.7-24.s390.rpm
83b35af5e4d0f049d88fd70d6b2693c4 krb5-workstation-1.2.7-24.s390x.rpm
750e1126b693966e4207546e2469e20b krb5-workstation-1.2.7-24.x86_64.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/team/key.html

You can verify each package with the following command:
    
    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum 


8. References:
 
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0523

9. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Shellshock makes Heartbleed look insignificant
Hacker Group Lizard Squad Takes Down Destiny, Call of Duty, FIFA And More
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.