Bug 435087 (CVE-2008-0948) - CVE-2008-0948 krb5: incorrect handling of high-numbered file descriptors in RPC library
Summary: CVE-2008-0948 krb5: incorrect handling of high-numbered file descriptors in R...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-0948
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 435881 435882
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-02-27 10:38 UTC by Tomas Hoger
Modified: 2023-05-11 13:02 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2008-03-31 09:43:40 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0181 0 normal SHIPPED_LIVE Critical: krb5 security update 2008-03-18 19:19:33 UTC

Description Tomas Hoger 2008-02-27 10:38:05 UTC
While investigating issue CVE-2008-0947 reported by MIT Kerboros security team
for krb5 version 1.4 and newer, it was discovered that RPC library as shipped
with krb5 versions prior to 1.3 (i.e. as shipped with Red Hat Enterprise Linux
2.1 and 3) is affected by similar problem.  Unauthenticated remote attacker
could cause application using RPC library (e.g. kadmind) to exit under certain
circumstances.

Problem exists in RPC library connection handling code that did not properly
handle situations when too many connections were opened.

Acknowledgements:

Red Hat would like to thank MIT for reporting this issue.

Comment 2 Tomas Hoger 2008-02-27 10:45:37 UTC
This issue was addressed upstream long ago via following patch:

http://anonsvn.mit.edu/cgi-bin/viewcvs.cgi/trunk/src/lib/rpc/rpc_dtablesize.c?r1=13269&r2=13528


Comment 6 Tomas Hoger 2008-03-18 18:24:17 UTC
Public now:

  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt

Lifting embargo.

Comment 7 Tomas Hoger 2008-03-18 18:27:55 UTC
This issue only affected krb5 package in Red Hat Enterprise Linux 2.1 and 3.

However, default configuration did not affect default configuration.  This issue
only affected systems configured to use higher resource limit than default 1024
for 'open files'.

Comment 8 Red Hat Product Security 2008-03-31 09:43:40 UTC
This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2008-0181.html




Note You need to log in before you can comment on or make changes to this bug.