Summary: | <app-crypt/mit-krb5-1.8.3-r2: Multiple Vulnerabilities (CVE-2010-{1323,1324,4020,4021}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Eray Aslan <eras> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | kerberos |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Eray Aslan
2010-12-01 07:27:53 UTC
*mit-krb5-1.8.3-r2 (01 Dec 2010) 01 Dec 2010; Eray Aslan <eras@gentoo.org> +mit-krb5-1.8.3-r2.ebuild, +files/CVE-2010-1323.1324.4020.patch, +files/mit-krb5_testsuite.patch: Security bump. Working test suite with test USE flag. Thank you, Eray. Arches, please test and mark stable: =app-crypt/mit-krb5-1.8.3-r2 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86" amd64 ok amd64 done. Thanks Agostino x86 stable Stable for HPPA. Stable for PPC. alpha/arm/ia64/m68k/s390/sh/sparc stable ppc64 done Thanks, folks. GLSA Vote: Yes. Added to pending GLSA request. CVE-2010-4021 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4021): The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue." CVE-2010-4020 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4020): MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations. CVE-2010-1324 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1324): MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key. CVE-2010-1323 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1323): MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. This issue was resolved and addressed in GLSA 201201-13 at http://security.gentoo.org/glsa/glsa-201201-13.xml by GLSA coordinator Sean Amoss (ackle). |