Bug 1302617 (CVE-2015-8629)

Summary: CVE-2015-8629 krb5: xdr_nullstring() doesn't check for terminating null character
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: abokovoy, carnil, cbuissar, csutherl, dknox, dpal, jclere, jdoyle, jplans, j, lgao, mbabacek, myarboro, nalin, npmccallum, pkis, rharwood, sardella, slawomir, twalsh, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: krb5 1.14.1, krb5 1.13.4 Doc Type: Bug Fix
Doc Text:
An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-04-01 07:07:23 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1302618, 1306969, 1306970, 1306973, 1306974    
Bug Blocks: 1302647    

Description Adam Mariš 2016-01-28 09:42:47 UTC
It was reported that in all versions of MIT krb5, an authenticated attacker can cause kadmind to read beyond the end of allocated memory by sending a string without a terminating zero byte. Information leakage may be possible for an attacker with permission to modify the database.

Upstream patch:

https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb

Comment 1 Adam Mariš 2016-01-28 09:43:19 UTC
Created krb5 tracking bugs for this issue:

Affects: fedora-all [bug 1302618]

Comment 7 Tomas Hoger 2016-03-03 21:29:10 UTC
Upstream bug report:

http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341

Fixed upstream in krb5 1.14.1:

http://web.mit.edu/kerberos/krb5-1.14/krb5-1.14.1.html

The upstream bug report also indicates the issue will be fixed in 1.13.4.

Comment 8 errata-xmlrpc 2016-03-22 21:02:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0493 https://rhn.redhat.com/errata/RHSA-2016-0493.html

Comment 9 errata-xmlrpc 2016-03-31 22:03:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:0532 https://rhn.redhat.com/errata/RHSA-2016-0532.html