Bug 545015 (CVE-2009-4212)

Summary: CVE-2009-4212 krb: KDC integer overflows in AES and RC4 decryption routines (MITKRB5-SA-2009-004)
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: kreilly, mjc, nalin, rcvalle, security-response-team, tao, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-01-14 07:57:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 546344, 546345, 546346, 546347, 546348, 546653, 546654, 546655    
Bug Blocks:    

Description Jan Lieskovsky 2009-12-07 10:52:03 UTC
Integer underflow flaws, leading to heap-based corruption, were found
in the way MIT Kerberos Key Distribution Center (KDC) used to
decrypt ciphertexts encrypted with Advanced Encryption Standard (AES)
and ARCFOUR (RC4) encryption algorithms. A remote KDC client
could provide a specially-crafted AES or RC4 encrypted ciphertext(s),
which once processed by a central KDC would lead to denial of
service (KDC crash or abort) or, potentially, to KDC relying
authentication services compromise or arbitrary code execution
with the privileges of the KDC centre.

Upstream advisory (not available yet):
--------------------------------------
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt

Upstream patches (not available yet):
-------------------------------------
http://web.mit.edu/kerberos/advisories/2009-004-patch_1.7.txt
http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt

Comment 11 Tomas Hoger 2010-01-12 19:43:03 UTC
Public now via:
  http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2009-004.txt

Comment 12 errata-xmlrpc 2010-01-12 22:26:30 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 4.7 Z Stream
  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 5.2 Z Stream
  Red Hat Enterprise Linux 5.3.Z - Server Only

Via RHSA-2010:0029 https://rhn.redhat.com/errata/RHSA-2010-0029.html

Comment 13 Fedora Update System 2010-01-14 01:20:57 UTC
krb5-1.7-18.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 14 Fedora Update System 2010-01-14 01:22:36 UTC
krb5-1.6.3-23.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.