MIT Kerberos 5 ASN.1解码远程拒绝服务漏洞

漏洞信息详情

MIT Kerberos 5 ASN.1解码远程拒绝服务漏洞

漏洞简介

Abstract Syntax Notation 1 (ASN.1)是用于多个应用程序和设备的数据标准,允许数据可在各种平台传递。
MIT Kerberos 5中的ASN.1解码库存在问题,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
ASN.1解码库在处理不确定长度BER编码数据时存在问题,可导致asn1buf_skiptail()中触发无限循环,导致应用程序产生拒绝服务。未授权攻击者可以使KDC或应用服务程序由于无限循环而挂起。或者攻击者伪造合法KDC或应用服务器可引起客户端由于无限循环而挂起。

漏洞公告

厂商补丁:
MIT

krb5-1.3.5已经修补此漏洞:

http://web.mit.edu/kerberos” target=”_blank”>
http://web.mit.edu/kerberos

krb5-1.3.4可采用如下补丁:

http://web.mit.edu/kerberos/advisories/2004-003-patch_1.3.4.txt” target=”_blank”>
http://web.mit.edu/kerberos/advisories/2004-003-patch_1.3.4.txt

相关PGP签名如下:

http://web.mit.edu/kerberos/advisories/2004-003-patch_1.3.4.txt.asc” target=”_blank”>
http://web.mit.edu/kerberos/advisories/2004-003-patch_1.3.4.txt.asc

Index: src/lib/krb5/asn.1/asn1buf.c

===================================================================

RCS file: /cvs/krbdev/krb5/src/lib/krb5/asn.1/asn1buf.c,v

retrieving revision 5.24

*** src/lib/krb5/asn.1/asn1buf.c 12 Mar 2003 04:33:30 -0000 5.24

– — src/lib/krb5/asn.1/asn1buf.c 23 Aug 2004 03:43:47 -0000

***************

*** 122,127 ****

– — 122,129 —-

return ASN1_OVERRUN;

}

while (nestlevel > 0) {

+ if (buf->bound – buf->next + 1 <= 0)

+ return ASN1_OVERRUN;

retval = asn1_get_tag_2(buf, &t);

if (retval) return retval;

if (!t.indef) {

PATCH AGAINST krb5-1.2.8可采用如下补丁:

http://web.mit.edu/kerberos/advisories/2004-003-patch_1.2.8.txt” target=”_blank”>
http://web.mit.edu/kerberos/advisories/2004-003-patch_1.2.8.txt

相关PGP签名如下:

http://web.mit.edu/kerberos/advisories/2004-003-patch_1.2.8.txt.asc” target=”_blank”>
http://web.mit.edu/kerberos/advisories/2004-003-patch_1.2.8.txt.asc

Index: src/lib/krb5/asn.1/asn1buf.c

===================================================================

RCS file: /cvs/krbdev/krb5/src/lib/krb5/asn.1/asn1buf.c,v

retrieving revision 5.19.2.1

diff -c -r5.19.2.1 asn1buf.c

*** src/lib/krb5/asn.1/asn1buf.c 31 Jan 2001 18:00:12 -0000 5.19.2.1

– — src/lib/krb5/asn.1/asn1buf.c 23 Aug 2004 03:54:50 -0000

***************

*** 140,145 ****

– — 140,147 —-

return ASN1_OVERRUN;

}

while (nestlevel > 0) {

+ if (buf->bound – buf->next + 1 <= 0)

+ return ASN1_OVERRUN;

retval = asn1_get_tag_indef(buf, &class, &construction, &tagnum,

&taglen, &tagindef);

if (retval) return retval;

参考网址

来源:US-CERT Technical Alert: TA04-247A
名称: TA04-247A
链接:http://www.us-cert.gov/cas/techalerts/TA04-247A.html

来源:US-CERT Vulnerability Note: VU#550464
名称: VU#550464
链接:http://www.kb.cert.org/vuls/id/550464

来源: XF
名称: kerberos-asn1-library-dos(17160)
链接:http://xforce.iss.net/xforce/xfdb/17160

来源: TRUSTIX
名称: 2004-0045
链接:http://www.trustix.net/errata/2004/0045/

来源: GENTOO
名称: GLSA-200409-09
链接:http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml

来源: BID
名称: 11079
链接:http://www.securityfocus.com/bid/11079

来源: DEBIAN
名称: DSA-543
链接:http://www.debian.org/security/2004/dsa-543

来源: web.mit.edu
链接:http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-003-asn1.txt

来源: REDHAT
名称: RHSA-2004:350
链接:http://rhn.redhat.com/errata/RHSA-2004-350.html

来源: OVAL
名称: oval:org.mitre.oval:def:10014
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10014

来源: BUGTRAQ
名称: 20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109508872524753&w=2

来源: CONECTIVA
名称: CLA-2004:860
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860

来源: US Government Resource: oval:org.mitre.oval:def:2139
名称: oval:org.mitre.oval:def:2139
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:2139

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享