Scientific Linux Security Update : openafs on SL5.x, SL6.x i386/x86_64 (20130724)

medium Nessus Plugin ID 69068

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

OpenAFS uses Kerberos tickets to secure network traffic. For historical reasons, it has only supported the DES encryption algorithm to encrypt these tickets. The weakness of DES's 56 bit key space has long been known, however it has recently become possible to use that weakness to cheaply (around $100) and rapidly (approximately 23 hours) compromise a service's long term key. An attacker must first obtain a ticket for the cell. They may then use a brute-force attack to compromise the cell's private service key. Once an attacker has gained access to the service key, they can use this to impersonate any user within the cell, including the super user, giving them access to all administrative capabilities as well as all user data. Recovering the service key from a DES encrypted ticket is an issue for any Kerberos service still using DES (and especially so for realms which still have DES keys on their ticket granting ticket). (CVE-2013-4134)

The -encrypt option to the 'vos' volume management command should cause it to encrypt all data between client and server. However, in versions of OpenAFS later than 1.6.0, it has no effect, and data is transmitted with integrity protection only. In all versions of OpenAFS, vos -encrypt has no effect when combined with the -localauth option. (CVE-2013-4135)

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?47d9be07

Plugin Details

Severity: Medium

ID: 69068

File Name: sl_20130724_openafs_on_SL5_x.nasl

Version: 1.7

Type: local

Agent: unix

Published: 7/26/2013

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:kmod-openafs-358, p-cpe:/a:fermilab:scientific_linux:openafs, p-cpe:/a:fermilab:scientific_linux:openafs-authlibs, p-cpe:/a:fermilab:scientific_linux:openafs-authlibs-devel, p-cpe:/a:fermilab:scientific_linux:openafs-client, p-cpe:/a:fermilab:scientific_linux:openafs-compat, p-cpe:/a:fermilab:scientific_linux:openafs-debug, p-cpe:/a:fermilab:scientific_linux:openafs-devel, p-cpe:/a:fermilab:scientific_linux:openafs-kernel-source, p-cpe:/a:fermilab:scientific_linux:openafs-kpasswd, p-cpe:/a:fermilab:scientific_linux:openafs-krb5, p-cpe:/a:fermilab:scientific_linux:openafs-module-tools, p-cpe:/a:fermilab:scientific_linux:openafs-plumbing-tools, p-cpe:/a:fermilab:scientific_linux:openafs-server, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 7/24/2013

Vulnerability Publication Date: 11/5/2013

Reference Information

CVE: CVE-2013-4134, CVE-2013-4135