This service will be undergoing maintenance at 00:00 UTC, 2016-08-01. It is expected to last about 1 hours

Bug 432620 (CVE-2008-0062)

Summary: CVE-2008-0062 krb5: uninitialized pointer use in krb5kdc
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: kreilly, nalin, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: source=upstream,reported=20080212,public=20080318,impact=critical
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-03-31 05:40:23 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Bug Depends On: 434923, 434924, 435881, 435882, 435883, 435884, 435885, 438022, 438023    
Bug Blocks:    
Attachments:
Description Flags
Upstream patch for CVE-2008-0062 and CVE-2008-0063 none

Description Tomas Hoger 2008-02-13 08:26:29 EST
MIT Kerberos Team reported following issue affecting MIT Kerberos 5 KDC with
Kerberos 4 support enabled:

CVE-2008-0062: A global variable holding a pointer to the message to
be sent back to the client is only set for two recognized krb4 message
types, but may be used (and freed) in additional cases, resulting in
use of a null or dangling pointer.

Acknowledgements:

Red Hat would like to thank MIT for reporting this issue.
Comment 3 Tomas Hoger 2008-02-13 08:56:18 EST
Created attachment 294787 [details]
Upstream patch for CVE-2008-0062 and CVE-2008-0063
Comment 5 Tomas Hoger 2008-02-15 09:06:24 EST
This issue affects krb5 packages as shipped in Red Hat Enterprise Linux 2.1, 3,
4 and 5 and current versions of Fedora.  Support for Kerberos v4 is not assumed
by default by krb5kdc on Red Hat Enterprise Linux 5 and Fedora, however default
configuration in kdc.conf enables this support explicitly (in nopreauth mode,
which is assumed and configured as default on Red Hat Enterprise Linux 2.1, 3
and 4).

Possible workaround -- disable v4 support if it's not needed -- in kdc.conf, set
v4_mode to none.
Comment 11 Tomas Hoger 2008-03-18 14:17:29 EDT
Public now:

  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt

Lifting embargo.
Comment 13 Fedora Update System 2008-03-18 14:49:47 EDT
krb5-1.6.1-9.fc7 has been submitted as an update for Fedora 7
Comment 14 Fedora Update System 2008-03-18 14:50:40 EDT
krb5-1.6.2-14.fc8 has been submitted as an update for Fedora 8
Comment 15 Fedora Update System 2008-03-21 18:17:06 EDT
krb5-1.6.1-9.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 16 Fedora Update System 2008-03-21 18:20:09 EDT
krb5-1.6.2-14.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.