Bug 432620 (CVE-2008-0062) - CVE-2008-0062 krb5: uninitialized pointer use in krb5kdc
Summary: CVE-2008-0062 krb5: uninitialized pointer use in krb5kdc
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-0062
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 434923 434924 435881 435882 435883 435884 435885 438022 438023
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-02-13 13:26 UTC by Tomas Hoger
Modified: 2023-05-11 12:59 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-03-31 09:40:23 UTC
Embargoed:


Attachments (Terms of Use)
Upstream patch for CVE-2008-0062 and CVE-2008-0063 (10.60 KB, patch)
2008-02-13 13:56 UTC, Tomas Hoger
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0164 0 normal SHIPPED_LIVE Critical: krb5 security and bugfix update 2008-03-18 19:26:13 UTC
Red Hat Product Errata RHSA-2008:0180 0 normal SHIPPED_LIVE Critical: krb5 security update 2008-03-18 18:47:13 UTC
Red Hat Product Errata RHSA-2008:0181 0 normal SHIPPED_LIVE Critical: krb5 security update 2008-03-18 19:19:33 UTC
Red Hat Product Errata RHSA-2008:0182 0 normal SHIPPED_LIVE Critical: krb5 security update 2008-03-18 19:22:41 UTC

Description Tomas Hoger 2008-02-13 13:26:29 UTC
MIT Kerberos Team reported following issue affecting MIT Kerberos 5 KDC with
Kerberos 4 support enabled:

CVE-2008-0062: A global variable holding a pointer to the message to
be sent back to the client is only set for two recognized krb4 message
types, but may be used (and freed) in additional cases, resulting in
use of a null or dangling pointer.

Acknowledgements:

Red Hat would like to thank MIT for reporting this issue.

Comment 3 Tomas Hoger 2008-02-13 13:56:18 UTC
Created attachment 294787 [details]
Upstream patch for CVE-2008-0062 and CVE-2008-0063

Comment 5 Tomas Hoger 2008-02-15 14:06:24 UTC
This issue affects krb5 packages as shipped in Red Hat Enterprise Linux 2.1, 3,
4 and 5 and current versions of Fedora.  Support for Kerberos v4 is not assumed
by default by krb5kdc on Red Hat Enterprise Linux 5 and Fedora, however default
configuration in kdc.conf enables this support explicitly (in nopreauth mode,
which is assumed and configured as default on Red Hat Enterprise Linux 2.1, 3
and 4).

Possible workaround -- disable v4 support if it's not needed -- in kdc.conf, set
v4_mode to none.

Comment 11 Tomas Hoger 2008-03-18 18:17:29 UTC
Public now:

  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt

Lifting embargo.

Comment 13 Fedora Update System 2008-03-18 18:49:47 UTC
krb5-1.6.1-9.fc7 has been submitted as an update for Fedora 7

Comment 14 Fedora Update System 2008-03-18 18:50:40 UTC
krb5-1.6.2-14.fc8 has been submitted as an update for Fedora 8

Comment 15 Fedora Update System 2008-03-21 22:17:06 UTC
krb5-1.6.1-9.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 16 Fedora Update System 2008-03-21 22:20:09 UTC
krb5-1.6.2-14.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.