SUSE SLED12 / SLES12 Security Update : krb5 (SUSE-SU-2015:0290-2)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

MIT kerberos krb5 was updated to fix several security issues and bugs.

Security issues fixed: CVE-2014-5351: The kadm5_randkey_principal_3
function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5
(aka krb5) sent old keys in a response to a -randkey -keepold request,
which allowed remote authenticated users to forge tickets by
leveraging administrative access.

- CVE-2014-5352: In the MIT krb5 libgssapi_krb5 library,
after gss_process_context_token() is used to process a
valid context deletion token, the caller was left with a
security context handle containing a dangling pointer.
Further uses of this handle would have resulted in
use-after-free and double-free memory access violations.
libgssrpc server applications such as kadmind were
vulnerable as they can be instructed to call
gss_process_context_token().

- CVE-2014-9421: If the MIT krb5 kadmind daemon receives
invalid XDR data from an authenticated user, it may have
performed use-after-free and double-free memory access
violations while cleaning up the partial deserialization
results. Other libgssrpc server applications might also
been vulnerable if they contain insufficiently defensive
XDR functions.

- CVE-2014-9422: The MIT krb5 kadmind daemon incorrectly
accepted authentications to two-component server
principals whose first component is a left substring of
'kadmin' or whose realm is a left prefix of the default
realm.

- CVE-2014-9423: libgssrpc applications including kadmind
output four or eight bytes of uninitialized memory to
the network as part of an unused 'handle' field in
replies to clients.

Bugs fixed :

- Work around replay cache creation race; (bnc#898439).

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://support.novell.com/security/cve/CVE-2014-5351.html
http://support.novell.com/security/cve/CVE-2014-5352.html
http://support.novell.com/security/cve/CVE-2014-9421.html
http://support.novell.com/security/cve/CVE-2014-9422.html
http://support.novell.com/security/cve/CVE-2014-9423.html
https://bugzilla.suse.com/897874
https://bugzilla.suse.com/898439
https://bugzilla.suse.com/912002
http://www.nessus.org/u?212f3878

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Software Development Kit 12 :

zypper in -t patch SUSE-SLE-SDK-12-2015-74=1

SUSE Linux Enterprise Server 12 :

zypper in -t patch SUSE-SLE-SERVER-12-2015-74=1

SUSE Linux Enterprise Desktop 12 :

zypper in -t patch SUSE-SLE-DESKTOP-12-2015-74=1

SUSE Linux Enterprise Build System Kit 12 :

zypper in -t patch SUSE-SLE-BSK-12-2015-74=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 6.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: SuSE Local Security Checks

Nessus Plugin ID: 83683 ()

Bugtraq ID: 70380
72494
72495
72496
72503

CVE ID: CVE-2014-5351
CVE-2014-5352
CVE-2014-9421
CVE-2014-9422
CVE-2014-9423

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now