Bug 435087 (CVE-2008-0948)

Summary: CVE-2008-0948 krb5: incorrect handling of high-numbered file descriptors in RPC library
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: kreilly, nalin, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-03-31 09:43:40 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 435881, 435882    
Bug Blocks:    

Description Tomas Hoger 2008-02-27 10:38:05 UTC
While investigating issue CVE-2008-0947 reported by MIT Kerboros security team
for krb5 version 1.4 and newer, it was discovered that RPC library as shipped
with krb5 versions prior to 1.3 (i.e. as shipped with Red Hat Enterprise Linux
2.1 and 3) is affected by similar problem.  Unauthenticated remote attacker
could cause application using RPC library (e.g. kadmind) to exit under certain
circumstances.

Problem exists in RPC library connection handling code that did not properly
handle situations when too many connections were opened.

Acknowledgements:

Red Hat would like to thank MIT for reporting this issue.

Comment 2 Tomas Hoger 2008-02-27 10:45:37 UTC
This issue was addressed upstream long ago via following patch:

http://anonsvn.mit.edu/cgi-bin/viewcvs.cgi/trunk/src/lib/rpc/rpc_dtablesize.c?r1=13269&r2=13528


Comment 6 Tomas Hoger 2008-03-18 18:24:17 UTC
Public now:

  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt

Lifting embargo.

Comment 7 Tomas Hoger 2008-03-18 18:27:55 UTC
This issue only affected krb5 package in Red Hat Enterprise Linux 2.1 and 3.

However, default configuration did not affect default configuration.  This issue
only affected systems configured to use higher resource limit than default 1024
for 'open files'.

Comment 8 Red Hat Product Security 2008-03-31 09:43:40 UTC
This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2008-0181.html