GLSA-200904-09 : MIT Kerberos 5: Multiple vulnerabilities

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200904-09
(MIT Kerberos 5: Multiple vulnerabilities)

Multiple vulnerabilities have been reported in MIT Kerberos 5:
A free() call on an uninitialized pointer in the ASN.1 decoder
when decoding an invalid encoding (CVE-2009-0846).
A buffer
overread in the SPNEGO GSS-API application, reported by Apple Product
Security (CVE-2009-0844).
A NULL pointer dereference in the
SPNEGO GSS-API application, reported by Richard Evans
An incorrect length check inside an ASN.1
decoder leading to spurious malloc() failures (CVE-2009-0847).

Impact :

A remote unauthenticated attacker could exploit the first vulnerability
to cause a Denial of Service or, in unlikely circumstances, execute
arbitrary code on the host running krb5kdc or kadmind with root
privileges and compromise the Kerberos key database. Exploitation of
the other vulnerabilities might lead to a Denial of Service in kadmind,
krb5kdc, or other daemons performing authorization against Kerberos
that utilize GSS-API or an information disclosure.

Workaround :

There is no known workaround at this time.

See also :

Solution :

All MIT Kerberos 5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-crypt/mit-krb5-1.6.3-r6'

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 36137 (gentoo_GLSA-200904-09.nasl)

Bugtraq ID: 34257

CVE ID: CVE-2009-0844

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now