Debian LTS: DLA-3206-1: heimdal security update | LinuxSecurity.com
-------------------------------------------------------------------------
Debian LTS Advisory DLA-3206-1                [email protected]
https://www.debian.org/lts/security/                       Guilhem Moulin
November 26, 2022                             https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : heimdal
Version        : 7.5.0+dfsg-3+deb10u1
CVE ID         : CVE-2019-14870 CVE-2021-3671 CVE-2021-44758 CVE-2022-3437
                 CVE-2022-41916 CVE-2022-42898 CVE-2022-44640
Debian Bug     : 946786 996586 1024187

Multiple security vulnerabilities were discovered in heimdal, an
implementation of the Kerberos 5 authentication protocol, which may
result in denial of service, information disclosure, or remote code
execution.

CVE-2019-14870

    Isaac Boukris reported that the Heimdal KDC before 7.7.1 does not
    apply delegation_not_allowed (aka not-delegated) user attributes for
    S4U2Self.  Instead the forwardable flag is set even if the
    impersonated client has the not-delegated flag set.

CVE-2021-3671

    Joseph Sutton discovered that the Heimdal KDC before 7.7.1 does not
    check for missing missing sname in TGS-REQ (Ticket Granting Server -
    Request) before before dereferencing.  An authenticated user could
    use this flaw to crash the KDC.

CVE-2021-44758

    It was discovered that Heimdal is prone to a NULL dereference in
    acceptors when the initial SPNEGO token has no acceptable
    mechanisms, which may result in denial of service for a server
    application that uses the Simple and Protected GSSAPI Negotiation
    Mechanism (SPNEGO).

CVE-2022-3437

    Evgeny Legerov reported that the DES and Triple-DES decryption
    routines in the Heimdal GSSAPI library before 7.7.1 were prone to
    buffer overflow on malloc() allocated memory when presented with a
    maliciously small packet.  In addition, the Triple-DES and RC4
    (arcfour) decryption routine were prone to non-constant time leaks,
    which could potentially yield to a leak of secret key material when
    using these ciphers.

CVE-2022-41916

    It was discovered that Heimdal's PKI certificate validation library
    before 7.7.1 can under some circumstances perform an out-of-bounds
    memory access when normalizing Unicode, which may result in denial
    of service.

CVE-2022-42898

    Greg Hudson discovered an integer multiplication overflow in the
    Privilege Attribute Certificate (PAC) parsing routine, which may
    result in denial of service for Heimdal KDCs and possibly Heimdal
    servers (e.g., via GSS-API) on 32-bit systems.

CVE-2022-44640

    Douglas Bagnall and the Heimdal maintainers independently discovered
    that Heimdal's ASN.1 compiler before 7.7.1 generates code that
    allows specially crafted DER encodings of CHOICEs to invoke the
    wrong free() function on the decoded structure upon decode error,
    which may result in remote code execution in the Heimdal KDC and
    possibly the Kerberos client, the X.509 library, and other
    components as well.

For Debian 10 buster, these problems have been fixed in version
7.5.0+dfsg-3+deb10u1.

We recommend that you upgrade your heimdal packages.

For the detailed security status of heimdal please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/heimdal

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3206-1: heimdal security update

November 26, 2022
Multiple security vulnerabilities were discovered in heimdal, an implementation of the Kerberos 5 authentication protocol, which may result in denial of service, information disclo...

Summary

CVE-2019-14870

Isaac Boukris reported that the Heimdal KDC before 7.7.1 does not
apply delegation_not_allowed (aka not-delegated) user attributes for
S4U2Self. Instead the forwardable flag is set even if the
impersonated client has the not-delegated flag set.

CVE-2021-3671

Joseph Sutton discovered that the Heimdal KDC before 7.7.1 does not
check for missing missing sname in TGS-REQ (Ticket Granting Server -
Request) before before dereferencing. An authenticated user could
use this flaw to crash the KDC.

CVE-2021-44758

It was discovered that Heimdal is prone to a NULL dereference in
acceptors when the initial SPNEGO token has no acceptable
mechanisms, which may result in denial of service for a server
application that uses the Simple and Protected GSSAPI Negotiation
Mechanism (SPNEGO).

CVE-2022-3437

Evgeny Legerov reported that the DES and Triple-DES decryption
routines in the Heimdal GSSAPI library before 7.7.1 were prone to
buffer overflow on malloc() allocated memory when presented with a
maliciously small packet. In addition, the Triple-DES and RC4
(arcfour) decryption routine were prone to non-constant time leaks,
which could potentially yield to a leak of secret key material when
using these ciphers.

CVE-2022-41916

It was discovered that Heimdal's PKI certificate validation library
before 7.7.1 can under some circumstances perform an out-of-bounds
memory access when normalizing Unicode, which may result in denial
of service.

CVE-2022-42898

Greg Hudson discovered an integer multiplication overflow in the
Privilege Attribute Certificate (PAC) parsing routine, which may
result in denial of service for Heimdal KDCs and possibly Heimdal
servers (e.g., via GSS-API) on 32-bit systems.

CVE-2022-44640

Douglas Bagnall and the Heimdal maintainers independently discovered
that Heimdal's ASN.1 compiler before 7.7.1 generates code that
allows specially crafted DER encodings of CHOICEs to invoke the
wrong free() function on the decoded structure upon decode error,
which may result in remote code execution in the Heimdal KDC and
possibly the Kerberos client, the X.509 library, and other
components as well.

For Debian 10 buster, these problems have been fixed in version
7.5.0+dfsg-3+deb10u1.

We recommend that you upgrade your heimdal packages.

For the detailed security status of heimdal please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/heimdal

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Severity
Package : heimdal
Version : 7.5.0+dfsg-3+deb10u1
CVE ID : CVE-2019-14870 CVE-2021-3671 CVE-2021-44758 CVE-2022-3437
Debian Bug : 946786 996586 1024187