Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 171889 - app-crypt/mit-krb5 Multiple issues CVE-2007-{095{6|7}|1216}
Summary: app-crypt/mit-krb5 Multiple issues CVE-2007-{095{6|7}|1216}
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High blocker (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B0? [glsa] jaervosz
Keywords:
: 173299 (view as bug list)
Depends on:
Blocks:
 
Reported: 2007-03-23 07:25 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2020-03-28 22:35 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
new ebuild (mit-krb5-1.5.2-r1.ebuild,2.41 KB, text/plain)
2007-03-29 01:53 UTC, Seemant Kulleen (RETIRED)
no flags Details
The first patch to fix telnetd (mit-krb5-SA-2007-001-telnetd.patch,2.04 KB, patch)
2007-03-29 01:54 UTC, Seemant Kulleen (RETIRED)
no flags Details | Diff
The second patch to fix syslogging (mit-krb5-SA-2007-002-syslog.patch,30.39 KB, patch)
2007-03-29 01:54 UTC, Seemant Kulleen (RETIRED)
no flags Details | Diff
The third and final patch (mit-krb5-SA-2007-003.patch,609 bytes, patch)
2007-03-29 01:54 UTC, Seemant Kulleen (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-23 07:25:43 UTC
CVE-2007-0957:

A buffer overflow exists in the krb5_klog_syslog() function used by
kadmind and the KDC.

An authenticated user may be able to execute arbitrary code on a host
running kadmind.

An authenticated user may be able to execute arbitrary code on KDC
host.  Also, a user controlling a Kerberos realm sharing a key with
the target realm may be able to execute arbitrary code on a KDC host.

Successful exploitation can compromise the Kerberos key database and
host security on the host running these programs.  (kadmind and the
KDC typically run as root.)  Unsuccessful exploitation attempts will
likely result in the affected program crashing.

Third-party applications calling krb5_klog_syslog() may also be
vulnerable.

This affects all releases of MIT krb5 up to and including krb5-1.6.

CVE-2007-0956:

A remotely-exploitable root vulnerability is present in an application
which ships in the krb5 sources.

This affects all releases of MIT krb5 up to and including krb5-1.6.

CVE-2007-1216:

An authenticated user may be able to execute arbitrary code on a host
running kadmind.

Successful exploitation can compromise the Kerberos key database and
host security on the host running these programs.  (kadmind and the
KDC typically run as root.)  Unsuccessful exploitation attempts will
likely result in the affected program crashing.

Third-party applications calling either the RPC library or the GSS-API
library provided with MIT krb5 may be vulnerable.

This vulnerability affects MIT krb5 releases krb5-1.4 up to and
including krb5-1.6.  It can affect third-party on all MIT krb5
releases, including krb5-1.6.
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-23 07:31:20 UTC
Seemant please attach updated ebuilds for pretesting. Do not commit anything to Portage yet.
Comment 2 Chris Gianelloni (RETIRED) gentoo-dev 2007-03-24 15:06:24 UTC
I didn't see what the "fix" is here and am curious, as I would like to *quietly* add a fix for this to the snapshot for the release.  We're planning on releasing before this date, and GRP does include kerberos support, but we likely will only be releasing 1 day before, meaning if I can slip in a patch without a revision bump into the current stable (in my snapshot only), nobody would be the wiser.  We would have a secure out-of-box release, yet the "upgrade" would still be the next day.

Is that possible/doable?
Comment 3 Seemant Kulleen (RETIRED) gentoo-dev 2007-03-24 15:12:59 UTC
Chris, yes, I'll send you an ebuild
Comment 4 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-24 15:58:28 UTC
Seemant could you attach the ebuilds here as well so I can call arch security liaisons?

Chris I'm awaiting answer from upstream. I'll update this as soon as I know more.
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-28 05:54:32 UTC
Answer received from upstream. Forwarded to Chris.

Seement could you please attach the updated ebuilds, the deadline is getting close?
Comment 6 Seemant Kulleen (RETIRED) gentoo-dev 2007-03-29 01:53:43 UTC
Created attachment 114842 [details]
new ebuild

This is the new proposed ebuild (though I reckon for final release the version will change).
Comment 7 Seemant Kulleen (RETIRED) gentoo-dev 2007-03-29 01:54:07 UTC
Created attachment 114843 [details, diff]
The first patch to fix telnetd
Comment 8 Seemant Kulleen (RETIRED) gentoo-dev 2007-03-29 01:54:30 UTC
Created attachment 114844 [details, diff]
The second patch to fix syslogging
Comment 9 Seemant Kulleen (RETIRED) gentoo-dev 2007-03-29 01:54:48 UTC
Created attachment 114845 [details, diff]
The third and final patch
Comment 10 Seemant Kulleen (RETIRED) gentoo-dev 2007-03-29 01:55:09 UTC
OK, here's the ebuild with 3 patches.  Please put the patches into FILESDIR.
Comment 11 Chris Gianelloni (RETIRED) gentoo-dev 2007-03-29 13:44:13 UTC
Still 1.5.2, correct?
Comment 12 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-29 14:16:16 UTC
Thx Seemant.

Arch Security Liaisons please test and report back on this bug. Do NOT commit anything at this time.
Comment 13 Chris Gianelloni (RETIRED) gentoo-dev 2007-03-29 15:50:00 UTC
OK.  I've added this as 1.5.2 (not -r1) into the snapshot.  While this will go public before the release date, this just makes it simpler on me since anything official that goes into the tree will definitely supersede the snapshot's version.

Thanks everyone!
Comment 14 Markus Rothe (RETIRED) gentoo-dev 2007-03-29 19:09:52 UTC
compiles and works on ppc64.
Comment 15 Tobias Scherbaum (RETIRED) gentoo-dev 2007-03-29 20:02:54 UTC
looks good on ppc
Comment 16 Gustavo Zacarias (RETIRED) gentoo-dev 2007-03-30 13:56:24 UTC
Looks ok on sparc.
Comment 17 René Nussbaumer (RETIRED) gentoo-dev 2007-03-30 21:05:55 UTC
Looks good on hppa.
Comment 18 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-04-01 17:59:15 UTC
Coordinated release in about 48 hours. Status so far is that we are ready for the following arches:

hppa ppc ppc64 sparc

We still need OK from the following arches:

x86 amd64 alpha

Security please review the drafted GLSA. 
Comment 19 Joshua Jackson (RETIRED) gentoo-dev 2007-04-02 19:05:36 UTC
looks good on x86 
Comment 20 Matthias Geerdsen (RETIRED) gentoo-dev 2007-04-02 19:57:09 UTC
adding kingtaco for amd64
Comment 21 Bryan Østergaard (RETIRED) gentoo-dev 2007-04-02 20:16:13 UTC
alpha and ia64 looks good.
Comment 22 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-04-02 20:18:39 UTC
Removing tcort since he's retired.
Comment 23 Mike Doty (RETIRED) gentoo-dev 2007-04-02 21:03:07 UTC
patches and compiles on amd64.
Comment 24 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-04-02 21:31:35 UTC
nice
Comment 25 Matthias Geerdsen (RETIRED) gentoo-dev 2007-04-03 19:34:08 UTC
public now, advisories availably on MIT site and bugtraq

seemant, please commit the updated ebuild (directly to stable for the tested arches)

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-003.txt
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-001-telnetd.txt

arm (and mips?) should be added as soon as the ebuild has been commited
Comment 26 Matthias Geerdsen (RETIRED) gentoo-dev 2007-04-03 19:51:52 UTC
updating status, since we should of course wait for the ebuild ;-)
Comment 27 Matthias Geerdsen (RETIRED) gentoo-dev 2007-04-03 20:29:17 UTC
thanks for the fast commit seemant

removing arch team members, adding missing arches

ready for GLSA publication
Comment 28 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-04-03 21:26:30 UTC
Thx everyone!

GLSA 200704-02
Comment 29 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-04-04 06:27:45 UTC
*** Bug 173299 has been marked as a duplicate of this bug. ***