Bug 435087 (CVE-2008-0948) - CVE-2008-0948 krb5: incorrect handling of high-numbered file descriptors in RPC library
Summary: CVE-2008-0948 krb5: incorrect handling of high-numbered file descriptors in R...
Alias: CVE-2008-0948
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 435881 435882
TreeView+ depends on / blocked
Reported: 2008-02-27 10:38 UTC by Tomas Hoger
Modified: 2021-02-25 17:19 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2008-03-31 09:43:40 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0181 0 normal SHIPPED_LIVE Critical: krb5 security update 2008-03-18 19:19:33 UTC

Description Tomas Hoger 2008-02-27 10:38:05 UTC
While investigating issue CVE-2008-0947 reported by MIT Kerboros security team
for krb5 version 1.4 and newer, it was discovered that RPC library as shipped
with krb5 versions prior to 1.3 (i.e. as shipped with Red Hat Enterprise Linux
2.1 and 3) is affected by similar problem.  Unauthenticated remote attacker
could cause application using RPC library (e.g. kadmind) to exit under certain

Problem exists in RPC library connection handling code that did not properly
handle situations when too many connections were opened.


Red Hat would like to thank MIT for reporting this issue.

Comment 2 Tomas Hoger 2008-02-27 10:45:37 UTC
This issue was addressed upstream long ago via following patch:


Comment 6 Tomas Hoger 2008-03-18 18:24:17 UTC
Public now:


Lifting embargo.

Comment 7 Tomas Hoger 2008-03-18 18:27:55 UTC
This issue only affected krb5 package in Red Hat Enterprise Linux 2.1 and 3.

However, default configuration did not affect default configuration.  This issue
only affected systems configured to use higher resource limit than default 1024
for 'open files'.

Comment 8 Red Hat Product Security 2008-03-31 09:43:40 UTC
This issue was addressed in:

Red Hat Enterprise Linux:

Note You need to log in before you can comment on or make changes to this bug.