Bug 1302617 (CVE-2015-8629) - CVE-2015-8629 krb5: xdr_nullstring() doesn't check for terminating null character
Summary: CVE-2015-8629 krb5: xdr_nullstring() doesn't check for terminating null chara...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-8629
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1302618 1306969 1306970 1306973 1306974
Blocks: 1302647
TreeView+ depends on / blocked
 
Reported: 2016-01-28 09:42 UTC by Adam Mariš
Modified: 2019-09-29 13:43 UTC (History)
21 users (show)

Fixed In Version: krb5 1.14.1, krb5 1.13.4
Doc Type: Bug Fix
Doc Text:
An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure.
Clone Of:
Environment:
Last Closed: 2016-04-01 07:07:23 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:0493 normal SHIPPED_LIVE Moderate: krb5 security update 2016-03-23 01:01:50 UTC
Red Hat Product Errata RHSA-2016:0532 normal SHIPPED_LIVE Moderate: krb5 security update 2016-04-01 01:52:02 UTC

Description Adam Mariš 2016-01-28 09:42:47 UTC
It was reported that in all versions of MIT krb5, an authenticated attacker can cause kadmind to read beyond the end of allocated memory by sending a string without a terminating zero byte. Information leakage may be possible for an attacker with permission to modify the database.

Upstream patch:

https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb

Comment 1 Adam Mariš 2016-01-28 09:43:19 UTC
Created krb5 tracking bugs for this issue:

Affects: fedora-all [bug 1302618]

Comment 7 Tomas Hoger 2016-03-03 21:29:10 UTC
Upstream bug report:

http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341

Fixed upstream in krb5 1.14.1:

http://web.mit.edu/kerberos/krb5-1.14/krb5-1.14.1.html

The upstream bug report also indicates the issue will be fixed in 1.13.4.

Comment 8 errata-xmlrpc 2016-03-22 21:02:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:0493 https://rhn.redhat.com/errata/RHSA-2016-0493.html

Comment 9 errata-xmlrpc 2016-03-31 22:03:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:0532 https://rhn.redhat.com/errata/RHSA-2016-0532.html


Note You need to log in before you can comment on or make changes to this bug.