Debian DSA-1524-1 : krb5 - several vulnerabilities

critical Nessus Plugin ID 31630

Synopsis

The remote Debian host is missing a security-related update.

Description

Several remote vulnerabilities have been discovered in the kdc component of the krb5, a system for authenticating users and services on a network. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2008-0062 An unauthenticated remote attacker may cause a krb4-enabled KDC to crash, expose information, or execute arbitrary code. Successful exploitation of this vulnerability could compromise the Kerberos key database and host security on the KDC host.

- CVE-2008-0063 An unauthenticated remote attacker may cause a krb4-enabled KDC to expose information. It is theoretically possible for the exposed information to include secret key data on some platforms.

- CVE-2008-0947 An unauthenticated remote attacker can cause memory corruption in the kadmind process, which is likely to cause kadmind to crash, resulting in a denial of service. It is at least theoretically possible for such corruption to result in database corruption or arbitrary code execution, though we have no such exploit and are not aware of any such exploits in use in the wild. In versions of MIT Kerberos shipped by Debian, this bug can only be triggered in configurations that allow large numbers of open file descriptors in a process.

Solution

Upgrade the krb5 packages.

For the old stable distribution (sarge), these problems have been fixed in version krb5 1.3.6-2sarge6.

For the stable distribution (etch), these problems have been fixed in version 1.4.4-7etch5.

See Also

https://security-tracker.debian.org/tracker/CVE-2008-0062

https://security-tracker.debian.org/tracker/CVE-2008-0063

https://security-tracker.debian.org/tracker/CVE-2008-0947

https://www.debian.org/security/2008/dsa-1524

Plugin Details

Severity: Critical

ID: 31630

File Name: debian_DSA-1524.nasl

Version: 1.24

Type: local

Agent: unix

Published: 3/21/2008

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:4.0, p-cpe:/a:debian:debian_linux:krb5, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 3/18/2008

Reference Information

CVE: CVE-2008-0062, CVE-2008-0063, CVE-2008-0947

CWE: 119, 189

DSA: 1524