[Touch-packages] [Bug 1354714] Re: buffer overrun in kadmind with ldap backend

2014-08-09 Thread Sam Hartman
This is fixed in Debian in 1.12.1+dfsg-87, currently in unstable.  The
only change between -6 (utopic) and -7 is the fix to this bug.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1354714

Title:
  buffer overrun in kadmind with ldap backend

Status in “krb5” package in Ubuntu:
  New
Status in “krb5” package in Debian:
  Unknown

Bug description:
  Fix LDAP key data segmentation [CVE-2014-4345]
  
  For principal entries having keys with multiple kvnos (due to use of
  -keepold), the LDAP KDB module makes an attempt to store all the keys
  having the same kvno into a single krbPrincipalKey attribute value.
  There is a fencepost error in the loop, causing currkvno to be set to
  the just-processed value instead of the next kvno.  As a result, the
  second and all following groups of multiple keys by kvno are each
  stored in two krbPrincipalKey attribute values.  Fix the loop to use
  the correct kvno value.
  
  CVE-2014-4345:
  
  In MIT krb5, when kadmind is configured to use LDAP for the KDC
  database, an authenticated remote attacker can cause it to perform an
  out-of-bounds write (buffer overrun) by performing multiple cpw
  -keepold operations.  An off-by-one error while copying key
  information to the new database entry results in keys sharing a common
  kvno being written to different array buckets, in an array whose size
  is determined by the number of kvnos present.  After sufficient
  iterations, the extra writes extend past the end of the
  (NULL-terminated) array.  The NULL terminator is always written after
  the end of the loop, so no out-of-bounds data is read, it is only
  written.
  
  Historically, it has been possible to convert an out-of-bounds write
  into remote code execution in some cases, though the necessary
  exploits must be tailored to the individual application and are
  usually quite complicated.  Depending on the allocated length of the
  array, an out-of-bounds write may also cause a segmentation fault
  and/or application crash.
  
  CVSSv2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1354714/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1354714] Re: buffer overrun in kadmind with ldap backend

2014-08-09 Thread Marc Deslauriers
This bug was fixed in the package krb5 - 1.12.1+dfsg-7
Sponsored for Sam Hartman (hartmans)

---
krb5 (1.12.1+dfsg-7) unstable; urgency=high

  * Apply upstream's patch for CVE-2014-4345 (MITKRB5-SA-2014-001), buffer
overrun in kadmind with LDAP backend, Closes: #757416

 -- Benjamin Kaduk ka...@mit.edu  Thu, 07 Aug 2014 18:33:37 -0400

** Changed in: krb5 (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1354714

Title:
  buffer overrun in kadmind with ldap backend

Status in “krb5” package in Ubuntu:
  Fix Released
Status in “krb5” package in Debian:
  Unknown

Bug description:
  Fix LDAP key data segmentation [CVE-2014-4345]
  
  For principal entries having keys with multiple kvnos (due to use of
  -keepold), the LDAP KDB module makes an attempt to store all the keys
  having the same kvno into a single krbPrincipalKey attribute value.
  There is a fencepost error in the loop, causing currkvno to be set to
  the just-processed value instead of the next kvno.  As a result, the
  second and all following groups of multiple keys by kvno are each
  stored in two krbPrincipalKey attribute values.  Fix the loop to use
  the correct kvno value.
  
  CVE-2014-4345:
  
  In MIT krb5, when kadmind is configured to use LDAP for the KDC
  database, an authenticated remote attacker can cause it to perform an
  out-of-bounds write (buffer overrun) by performing multiple cpw
  -keepold operations.  An off-by-one error while copying key
  information to the new database entry results in keys sharing a common
  kvno being written to different array buckets, in an array whose size
  is determined by the number of kvnos present.  After sufficient
  iterations, the extra writes extend past the end of the
  (NULL-terminated) array.  The NULL terminator is always written after
  the end of the loop, so no out-of-bounds data is read, it is only
  written.
  
  Historically, it has been possible to convert an out-of-bounds write
  into remote code execution in some cases, though the necessary
  exploits must be tailored to the individual application and are
  usually quite complicated.  Depending on the allocated length of the
  array, an out-of-bounds write may also cause a segmentation fault
  and/or application crash.
  
  CVSSv2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1354714/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1354714] Re: buffer overrun in kadmind with ldap backend

2014-08-09 Thread Bug Watch Updater
** Changed in: krb5 (Debian)
   Status: Unknown = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1354714

Title:
  buffer overrun in kadmind with ldap backend

Status in “krb5” package in Ubuntu:
  Fix Released
Status in “krb5” package in Debian:
  Fix Released

Bug description:
  Fix LDAP key data segmentation [CVE-2014-4345]
  
  For principal entries having keys with multiple kvnos (due to use of
  -keepold), the LDAP KDB module makes an attempt to store all the keys
  having the same kvno into a single krbPrincipalKey attribute value.
  There is a fencepost error in the loop, causing currkvno to be set to
  the just-processed value instead of the next kvno.  As a result, the
  second and all following groups of multiple keys by kvno are each
  stored in two krbPrincipalKey attribute values.  Fix the loop to use
  the correct kvno value.
  
  CVE-2014-4345:
  
  In MIT krb5, when kadmind is configured to use LDAP for the KDC
  database, an authenticated remote attacker can cause it to perform an
  out-of-bounds write (buffer overrun) by performing multiple cpw
  -keepold operations.  An off-by-one error while copying key
  information to the new database entry results in keys sharing a common
  kvno being written to different array buckets, in an array whose size
  is determined by the number of kvnos present.  After sufficient
  iterations, the extra writes extend past the end of the
  (NULL-terminated) array.  The NULL terminator is always written after
  the end of the loop, so no out-of-bounds data is read, it is only
  written.
  
  Historically, it has been possible to convert an out-of-bounds write
  into remote code execution in some cases, though the necessary
  exploits must be tailored to the individual application and are
  usually quite complicated.  Depending on the allocated length of the
  array, an out-of-bounds write may also cause a segmentation fault
  and/or application crash.
  
  CVSSv2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1354714/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp