EulerOS 2.0 SP3 : krb5 (EulerOS-SA-2018-1398)

High Nessus Plugin ID 119526

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the krb5 packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

- null dereference in kadmind or DN container check bypass by supplying special crafted data (CVE-2018-5729)

- DN container check bypass by supplying special crafted data (CVE-2018-5730)

- A stack based buffer overflow was found in the get_matching_data() function, when reading the principal's certificate during pkinit preauthentication. If the Certifcate Authority's subject line is sufficiently long, an attacker able to have a specially crafted certificate signed could crash the authentication process, such as kinit, or, possibly, run arbitrary code.(CVE-2017-15088 )

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected krb5 packages.

See Also

http://www.nessus.org/u?a31ab41c

Plugin Details

Severity: High

ID: 119526

File Name: EulerOS_SA-2018-1398.nasl

Version: 1.2

Type: local

Published: 2018/12/10

Updated: 2019/06/28

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:krb5-devel, p-cpe:/a:huawei:euleros:krb5-libs, p-cpe:/a:huawei:euleros:krb5-pkinit, p-cpe:/a:huawei:euleros:krb5-server, p-cpe:/a:huawei:euleros:krb5-server-ldap, p-cpe:/a:huawei:euleros:krb5-workstation, p-cpe:/a:huawei:euleros:libkadm5, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Patch Publication Date: 2018/11/26

Reference Information

CVE: CVE-2017-15088, CVE-2018-5729, CVE-2018-5730