Date:         Mon, 3 Nov 2014 17:54:21 +0000
Reply-To:     scientific-linux-users@listserv.fnal.gov
Sender:       Security Errata for Scientific Linux
              
From:         Pat Riehecky 
Subject:      Security ERRATA Moderate: krb5 on SL6.x i386/x86_64
MIME-Version: 1.0

Synopsis:          Moderate: krb5 security and bug fix update
Advisory ID:       SLSA-2014:1389-2
Issue Date:        2014-10-14
CVE Numbers:       CVE-2013-1418
                   CVE-2013-6800
                   CVE-2014-4341
                   CVE-2014-4344
                   CVE-2014-4345
                   CVE-2014-4342
                   CVE-2014-4343
--

It was found that if a KDC served multiple realms, certain requests could
cause the setup_server_realm() function to dereference a NULL pointer. A
remote, unauthenticated attacker could use this flaw to crash the KDC
using a specially crafted request. (CVE-2013-1418, CVE-2013-6800)

A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO
acceptor for continuation tokens. A remote, unauthenticated attacker could
use this flaw to crash a GSSAPI-enabled server application.
(CVE-2014-4344)

A buffer overflow was found in the KADM5 administration server (kadmind)
when it was used with an LDAP back end for the KDC database. A remote,
authenticated attacker could potentially use this flaw to execute
arbitrary code on the system running kadmind. (CVE-2014-4345)

Two buffer over-read flaws were found in the way MIT Kerberos handled
certain requests. A remote, unauthenticated attacker who is able to inject
packets into a client or server application's GSSAPI session could use
either of these flaws to crash the application. (CVE-2014-4341,
CVE-2014-4342)

A double-free flaw was found in the MIT Kerberos SPNEGO initiators. An
attacker able to spoof packets to appear as though they are from an GSSAPI
acceptor could use this flaw to crash a client application that uses MIT
Kerberos. (CVE-2014-4343)
--

SL6
  x86_64
    krb5-debuginfo-1.10.3-33.el6.i686.rpm
    krb5-debuginfo-1.10.3-33.el6.x86_64.rpm
    krb5-libs-1.10.3-33.el6.i686.rpm
    krb5-libs-1.10.3-33.el6.x86_64.rpm
    krb5-pkinit-openssl-1.10.3-33.el6.x86_64.rpm
    krb5-workstation-1.10.3-33.el6.x86_64.rpm
    krb5-devel-1.10.3-33.el6.i686.rpm
    krb5-devel-1.10.3-33.el6.x86_64.rpm
    krb5-server-1.10.3-33.el6.x86_64.rpm
    krb5-server-ldap-1.10.3-33.el6.i686.rpm
    krb5-server-ldap-1.10.3-33.el6.x86_64.rpm
  i386
    krb5-debuginfo-1.10.3-33.el6.i686.rpm
    krb5-libs-1.10.3-33.el6.i686.rpm
    krb5-pkinit-openssl-1.10.3-33.el6.i686.rpm
    krb5-workstation-1.10.3-33.el6.i686.rpm
    krb5-devel-1.10.3-33.el6.i686.rpm
    krb5-server-1.10.3-33.el6.i686.rpm
    krb5-server-ldap-1.10.3-33.el6.i686.rpm

- Scientific Linux Development Team

SciLinux: CVE-2013-1418 Moderate: krb5 SL6.x i386/x86_64

Moderate: krb5 security and bug fix update

Summary

Moderate: krb5 security and bug fix update



Security Fixes

Severity
Advisory ID: SLSA-2014:1389-2
Issued Date: : 2014-10-14
CVE Numbers: CVE-2013-1418
CVE-2013-6800
CVE-2014-4341