Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 263398 (CVE-2009-0844) - <app-crypt/mit-krb5-1.6.3-r6 MITKRB5-SA-2009-001 Multiple vulnerabilities in SPNEGO, ASN.1 decoder (CVE-2009-{0844,0846,0847})
Summary: <app-crypt/mit-krb5-1.6.3-r6 MITKRB5-SA-2009-001 Multiple vulnerabilities in ...
Status: RESOLVED FIXED
Alias: CVE-2009-0844
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High blocker (vote)
Assignee: Gentoo Security
URL: http://web.mit.edu/kerberos/advisorie...
Whiteboard: A0 [glsa]
Keywords:
: 265392 (view as bug list)
Depends on:
Blocks:
 
Reported: 2009-03-22 19:07 UTC by Robert Buchholz (RETIRED)
Modified: 2009-04-09 12:09 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
CVE-2009-0844+CVE-2009-0847.patch (CVE-2009-0844+CVE-2009-0847.patch,2.03 KB, patch)
2009-03-22 19:09 UTC, Robert Buchholz (RETIRED)
no flags Details | Diff
ebuild using the attached patch (mit-krb5-1.6.3-r6.ebuild,2.60 KB, text/plain)
2009-03-23 09:14 UTC, Michael Hammer (RETIRED)
no flags Details
ebuild including the latest CVE patch (mit-krb5-1.6.3-r6.ebuild,2.64 KB, text/plain)
2009-04-02 13:42 UTC, Michael Hammer (RETIRED)
no flags Details
CVE patch to comment #10 (CVE-2009-0846.patch,1.64 KB, patch)
2009-04-02 13:43 UTC, Michael Hammer (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2009-03-22 19:07:07 UTC
** Please note that this issue is confidential and no information should be
disclosed until it is made public, see "Whiteboard" for a date **

[CVE-2009-0844]

The MIT krb5 implementation of the SPNEGO GSS-API mechanism can read
beyond the end of a network input buffer.  This can cause a GSS-API 
application to crash by reading from invalid address space.  Under  
theoretically possible but very unlikely conditions, a small        
information leak may occur.  We believe that no successful exploit  
exists that could induce an information leak.

[CVE-2009-0847]

MIT krb5 can perform an incorrect length check inside an ASN.1
decoder.  This only presents a problem in the PK-INIT code paths.  In
the MIT krb5 KDC or kinit program, this could lead to spurious       
malloc() failures or, under some conditions, program crash.  We have 
heard reports of the spurious malloc() failures, but nobody has yet  
made the publicly made the connection to a security issue.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2009-03-22 19:08:20 UTC
Note that CVE-2009-0845 will also be covered in MITKRB5-SA-2009-001, but has been disclosed in bug 262736 previously.

Mueli, please prepare an ebuild applying the patch and attach it to this bug report. Do not commit anything to CVS, we will do prestable testing on this bug.
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2009-03-22 19:09:28 UTC
Created attachment 185901 [details, diff]
CVE-2009-0844+CVE-2009-0847.patch
Comment 3 Michael Hammer (RETIRED) gentoo-dev 2009-03-23 09:14:08 UTC
Created attachment 185967 [details]
ebuild using the attached patch
Comment 4 Michael Hammer (RETIRED) gentoo-dev 2009-03-23 09:15:25 UTC
To build 1.6.3-r6 simply copy the applied patch into $FILESDIR with the given name.

g, mueli
Comment 5 Robert Buchholz (RETIRED) gentoo-dev 2009-03-23 10:52:50 UTC
Arch Security Liaisons, please test the attached ebuild and report it stable on this bug.
Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"

CC'ing current Liaisons:
   alpha : yoswink, armin76
   amd64 : keytoaster, tester
    hppa : jer
     ppc : dertobi123
   ppc64 : corsair
   sparc : fmccor
     x86 : maekke, armin76
Comment 6 Jeroen Roovers (RETIRED) gentoo-dev 2009-03-23 16:11:47 UTC
OK for HPPA.
Comment 7 Markus Meier gentoo-dev 2009-03-23 23:00:56 UTC
looks good on amd64/x86.
Comment 8 Markus Rothe (RETIRED) gentoo-dev 2009-03-24 09:03:57 UTC
add ranger
Comment 9 Tobias Heinlein (RETIRED) gentoo-dev 2009-03-24 14:44:49 UTC
Removing yoswink and adding klausman as per armin's request.
Comment 10 Robert Buchholz (RETIRED) gentoo-dev 2009-03-27 23:28:01 UTC
I'm sorry to inform you all that another vulnerability has been brought to our attention confidentially by MIT upstream, and we should fix this issue as well. It might allow for remote execution of code with root privileges. I have forwarded details to mueli, and I hope he will have a new prestable ebuild here to test shortly.

MITKRB5-SA-2009-002 [CVE-2009-0846]:
ASN.1 decoder frees uninitialized pointer
An ASN.1 decoder can free an uninitialized pointer when decoding an
invalid encoding.  This can cause a Kerberos application to crash, or,
under theoretically possible but unlikely circumstances, execute
arbitrary malicious code.  No exploit is known to exist that would
cause arbitrary code execution.
...
An unauthenticated, remote attacker could cause a
Kerberos application, including the Kerberos administration daemon
(kadmind) or the KDC to crash, and possibly to execute arbitrary code.

Compromise of the KDC or kadmind can compromise the Kerberos key
database and host security on the KDC host.  (The KDC and kadmind
typically run as root.)

Third-party applications using MIT krb5 may also be vulnerable.
Comment 11 Michael Hammer (RETIRED) gentoo-dev 2009-04-02 13:42:24 UTC
Created attachment 187080 [details]
ebuild including the latest CVE patch
Comment 12 Michael Hammer (RETIRED) gentoo-dev 2009-04-02 13:43:07 UTC
Created attachment 187082 [details, diff]
CVE patch to comment #10
Comment 13 Michael Hammer (RETIRED) gentoo-dev 2009-04-02 13:44:54 UTC
(In reply to comment #10)

Sry for the delay. See attached patch and new ebuild using this patch.

g, mueli

Comment 14 Ferris McCormick (RETIRED) gentoo-dev 2009-04-02 16:34:35 UTC
Sparc looks good.
Comment 15 Robert Buchholz (RETIRED) gentoo-dev 2009-04-02 18:02:36 UTC
Adding another new minion for prestable love.
Comment 16 Joe Jezak (RETIRED) gentoo-dev 2009-04-02 20:02:53 UTC
Builds fine and seems to work on ppc/ppc64.
Comment 17 Robert Buchholz (RETIRED) gentoo-dev 2009-04-07 23:31:21 UTC
now public, please commit with the stable keywords gathered ASAP.
Comment 18 Robert Buchholz (RETIRED) gentoo-dev 2009-04-08 00:49:24 UTC
*** Bug 265392 has been marked as a duplicate of this bug. ***
Comment 19 Jeroen Roovers (RETIRED) gentoo-dev 2009-04-08 04:33:41 UTC
(In reply to comment #17)
> now public, please commit with the stable keywords gathered ASAP.

OK for HPPA as well.
Comment 20 Ferris McCormick (RETIRED) gentoo-dev 2009-04-08 13:33:09 UTC
Sure, once it makes it to CVS.
Comment 21 Michael Hammer (RETIRED) gentoo-dev 2009-04-08 14:29:38 UTC
Commited -r6 revision including the patches - sry for missing that ...

g, mueli
Comment 22 Jeroen Roovers (RETIRED) gentoo-dev 2009-04-08 14:39:49 UTC
(In reply to comment #17)
> now public, please commit with the stable keywords gathered ASAP.

The keywords for sparc, ppc{,64} and hppa didn't make it into the ebuild.
Comment 23 Raúl Porcel (RETIRED) gentoo-dev 2009-04-08 14:40:03 UTC
+  08 Apr 2009; Raúl Porcel <armin76@gentoo.org> mit-krb5-1.6.3-r6.ebuild:
+  alpha/arm/ia64/m68k/s390/sh/sparc/x86 stable wrt #263398 and also
+  stabilize on hppa/ppc/ppc64

Remaining: amd64
Comment 24 Tobias Heinlein (RETIRED) gentoo-dev 2009-04-08 17:55:06 UTC
amd64 stable.
Comment 25 Robert Buchholz (RETIRED) gentoo-dev 2009-04-08 22:47:24 UTC
GLSA 200904-09
Comment 26 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-04-09 12:09:26 UTC
CVE-2009-0844 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0844):
  The get_input_token function in the SPNEGO implementation in MIT
  Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to
  cause a denial of service (daemon crash) and possibly obtain
  sensitive information via a crafted length value that triggers a
  buffer over-read.

CVE-2009-0846 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0846):
  The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c
  in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5)
  before 1.6.4 allows remote attackers to cause a denial of service
  (daemon crash) or possibly execute arbitrary code via vectors
  involving an invalid DER encoding that triggers a free of an
  uninitialized pointer.

CVE-2009-0847 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0847):
  The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5
  (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to
  cause a denial of service (application crash) via a crafted length
  value that triggers an erroneous malloc call, related to incorrect
  calculations with pointer arithmetic.