Overview
The MIT Kerberos 5 library does not securely deallocate heap memory when decoding ASN.1 structures, resulting in double-free vulnerabilities. An unauthenticated, remote attacker could execute arbitrary code on a KDC server, which could compromise an entire Kerberos realm. An attacker may also be able to execute arbitrary code on Kerberos clients, or cause a denial of service on KDCs or clients.
Description
As described on the MIT Kerberos web site: "Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography." MIT Kerberos code is used in network applications from a variety of different vendors and is included in many UNIX and Linux distributions. Kerberos 5 protocol messages are defined using Abstract Syntax Notation One (ASN.1). When ASN.1 decoding functions in the MIT Kerberos 5 library handle error conditions, the functions free() a memory reference and return the reference to the calling function. In some cases, error handling code in the calling functions may free() the memory reference again, resulting in a double-free vulnerability. MITKRB5-SA-2004-002 explains in more detail: |
Impact
An unauthenticated, remote attacker could execute arbitrary code on a KDC server. This could allow an attacker to gain the master secret for a Kerberos realm, leading to compromise of the entire realm. An attacker who is able to impersonate a KDC or application server may be able to execute arbitrary code on Kerberos clients. An attacker may also be able to crash a KDC or client, causing a denial of service. |
Solution
Apply a patch |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt
- http://web.mit.edu/kerberos/www/
- http://web.mit.edu/kerberos/www/krb5-1.3/
- http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#asn1
- http://www.itu.int/ITU-T/asn1/
- http://www.itu.int/ITU-T/studygroups/com10/languages/
- http://www.cmf.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#kerbfirewall
- http://www.securitytracker.com/alerts/2004/Aug/1011106.html
Acknowledgements
Thanks to Tom Yu and the MIT Kerberos Development Team for reporting this vulnerability and coordinating with vendors. MITKRB5-SA-2004-002 acknowledges Will Fiveash and Nico Williams.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2004-0642 |
Severity Metric: | 20.55 |
Date Public: | 2004-08-31 |
Date First Published: | 2004-09-02 |
Date Last Updated: | 2005-05-10 16:02 UTC |
Document Revision: | 43 |