MIT Kerberos管理守护程序Kadmind二次释放漏洞

漏洞信息详情

MIT Kerberos管理守护程序Kadmind二次释放漏洞

漏洞简介

Kerberos是美国麻省理工学院(MIT)开发的一套网络认证协议,它采用客户端/服务器结构,并且客户端和服务器端均可对对方进行身份认证(即双重验证),可防止窃听、防止replay攻击等。MIT Kerberos 5(又名krb5)是美国麻省理工学院(MIT)开发的一套网络认证协议,它采用客户端/服务器结构,并且客户端和服务器端均可对对方进行身份认证(即双重验证),可防止窃听、防止replay攻击等。

Kerberos在处理特定畸形的请求时存在内存处理漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。

如果在消息中检测到了无效的direction值的话src/lib/gssapi/krb5/k5unseal.c文件的kg_unseal_v1()函数会释放为message_buffer gss_buffer_t所分配的内存。该函数既没有将指针设置为空,也没有将长度设置为0,应用程序之后对这个gss_buffer_t调用gss_release_buffer()就会导致二次释放内存。

krb5-1.4所引入的RPC库RPCSEC_GSS认证在gss_unwrap()失败时会调用gss_release_buffer(),这允许已认证的攻击者触发二次释放。调用了MIT krb5所提供的RPC库且使用RPCSEC_GSS认证方式的第三方应用程序受这个漏洞影响。如果在出现gss_unseal()或gss_unwrap()错误时调用gss_release_buffer()的话,则调用MIT GSS-API库的第三方应用程序也受这个漏洞影响。

漏洞公告

厂商补丁:

Debian

——

Debian已经为此发布了一个安全公告(DSA-1276-1)以及相应补丁:

DSA-1276-1:New krb5 packages fix several vulnerabilities

链接:
http://www.debian.org/security/2007/dsa-1276” target=”_blank”>


http://www.debian.org/security/2007/dsa-1276

补丁下载:

Source archives:


http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge4.dsc” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge4.dsc

Size/MD5 checksum: 782 a4a9a2cff9292af1de210f83edcee281


http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge4.diff.gz” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge4.diff.gz

Size/MD5 checksum: 666048 006edbace85ee6fab561c8f5ba59914d


http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6.orig.tar.gz” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6.orig.tar.gz

Size/MD5 checksum: 6526510 7974d0fc413802712998d5fc5eec2919

Architecture independent components:


http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.3.6-2sarge4_all.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.3.6-2sarge4_all.deb

Size/MD5 checksum: 718724 9bd56e8f5a673661416a042cc315509b

Alpha architecture:


http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 114882 0b1d6a3f226b48f3065f8e065049a02a


http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 247602 b36d6e32ae319ed6953327d0de0e091c


http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 62892 a96ce75c69cc4423f0922a49ce97b7ef


http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 137006 6285c054dbb18b511153aeab6d5bb399


http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 89654 491c88a0bea723021f0f1eda84450208


http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 72142 3cad8d2db4270a422c0ba0ccfd6a9151


http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 144782 dea1c0c916c80b59174b4cfd18f1eb5e


http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 201754 42d6fcb995989672cfde30a467f9486e


http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_alpha.deb” target=”_blank”>


http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_alpha.deb

Size/MD5 checksum: 860980 3dabb660978f0d3cfc2c121acf8a48de


http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_alpha.de


参考网址

来源:HP

链接:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923

来源:SECUNIA

链接:http://secunia.com/advisories/24736

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2007:077

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2007-0095.html

来源:SECUNIA

链接:http://secunia.com/advisories/24735

来源:SECUNIA

链接:http://secunia.com/advisories/24757

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/464591/100/0/threaded

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2007/1470

来源:BID

链接:https://www.securityfocus.com/bid/23282

来源:CONFIRM

链接:http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt

来源:CERT

链接:http://www.us-cert.gov/cas/techalerts/TA07-093B.html

来源:SECUNIA

链接:http://secunia.com/advisories/24817

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/464666/100/0/threaded

来源:SECTRACK

链接:http://www.securitytracker.com/id?1017852

来源:GENTOO

链接:http://security.gentoo.org/glsa/glsa-200704-02.xml

来源:CERT

链接:http://www.us-cert.gov/cas/techalerts/TA07-109A.html

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2007/1218

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2007/1916

来源:SECUNIA

链接:http://secunia.com/advisories/24966

来源:SECUNIA

链接:http://secunia.com/advisories/24785

来源:CERT-VN

链接:http://www.kb.cert.org/vuls/id/419344

来源:UBUNTU

链接:http://www.ubuntu.com/usn/usn-449-1

来源:SECUNIA

链接:http://secunia.com/advisories/24740

来源:SECUNIA

链接:http://secunia.com/advisories/24786

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/464814/30/7170/threaded

来源:CONFIRM

链接:http://docs.info.apple.com/article.html?artnum=305391

来源:DEBIAN

链接:https://www.debian.org/security/2007/dsa-1276

来源:SECUNIA

链接:http://secunia.com/advisories/24706

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/33413

来源:APPLE

链接:http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html

来源:SUSE

链接:http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135

来源:SECUNIA

链接:http://secunia.com/advisories/24750

来源:SECUNIA

链接:http://secunia.com/advisories/25388

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享