openSUSE 15 Security Update : libheimdal (openSUSE-SU-2023:0020-1)

critical Nessus Plugin ID 170098

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2023:0020-1 advisory.

- All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set. (CVE-2019-14870)

- A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.
(CVE-2021-3671)

- Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept. (CVE-2021-44758)

- A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack. (CVE-2022-3437)

- Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue. (CVE-2022-41916)

- PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has a similar bug.
(CVE-2022-42898)

- Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC). (CVE-2022-44640)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?99f274fe

https://www.suse.com/security/cve/CVE-2019-14870

https://www.suse.com/security/cve/CVE-2021-3671

https://www.suse.com/security/cve/CVE-2021-44758

https://www.suse.com/security/cve/CVE-2022-3437

https://www.suse.com/security/cve/CVE-2022-41916

https://www.suse.com/security/cve/CVE-2022-42898

https://www.suse.com/security/cve/CVE-2022-44640

Plugin Details

Severity: Critical

ID: 170098

File Name: openSUSE-2023-0020-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 1/17/2023

Updated: 9/7/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2019-14870

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2022-44640

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libasn1-8, p-cpe:/a:novell:opensuse:libgssapi3, p-cpe:/a:novell:opensuse:libkrb5-26, p-cpe:/a:novell:opensuse:libsl0, p-cpe:/a:novell:opensuse:libkdc2, p-cpe:/a:novell:opensuse:libkadm5srv8, p-cpe:/a:novell:opensuse:libheimedit0, p-cpe:/a:novell:opensuse:libhx509-5, p-cpe:/a:novell:opensuse:libheimbase1, p-cpe:/a:novell:opensuse:libroken18, p-cpe:/a:novell:opensuse:libheimntlm0, p-cpe:/a:novell:opensuse:libhdb9, p-cpe:/a:novell:opensuse:libwind0, p-cpe:/a:novell:opensuse:libhcrypto4, cpe:/o:novell:opensuse:15.3, p-cpe:/a:novell:opensuse:libkadm5clnt7, p-cpe:/a:novell:opensuse:libkafs0, p-cpe:/a:novell:opensuse:libotp0, p-cpe:/a:novell:opensuse:libheimdal-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/16/2023

Vulnerability Publication Date: 12/10/2019

Reference Information

CVE: CVE-2019-14870, CVE-2021-3671, CVE-2021-44758, CVE-2022-3437, CVE-2022-41916, CVE-2022-42898, CVE-2022-44640