RHEL 7 : krb5 (RHSA-2016:2591)

medium Nessus Plugin ID 94554

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2016:2591 advisory.

Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).

The following packages have been upgraded to a newer upstream version: krb5 (1.14.1). (BZ#1292153)

Security Fix(es):

* A NULL pointer dereference flaw was found in MIT Kerberos kadmind service. An authenticated attacker with permission to modify a principal entry could use this flaw to cause kadmind to dereference a null pointer and crash by supplying an empty DB argument to the modify_principal command, if kadmind was configured to use the LDAP KDB module. (CVE-2016-3119)

* A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to dereference a null pointer and crash by making an S4U2Self request, if the restrict_anonymous_to_tgt option was set to true. (CVE-2016-3120)

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?11d51549

http://www.nessus.org/u?4165441c

https://access.redhat.com/errata/RHSA-2016:2591

https://access.redhat.com/security/updates/classification/#low

https://bugzilla.redhat.com/show_bug.cgi?id=1135427

https://bugzilla.redhat.com/show_bug.cgi?id=1146945

https://bugzilla.redhat.com/show_bug.cgi?id=1183058

https://bugzilla.redhat.com/show_bug.cgi?id=1247261

https://bugzilla.redhat.com/show_bug.cgi?id=1256735

https://bugzilla.redhat.com/show_bug.cgi?id=1283902

https://bugzilla.redhat.com/show_bug.cgi?id=1284987

https://bugzilla.redhat.com/show_bug.cgi?id=1290239

https://bugzilla.redhat.com/show_bug.cgi?id=1292153

https://bugzilla.redhat.com/show_bug.cgi?id=1296241

https://bugzilla.redhat.com/show_bug.cgi?id=1297591

https://bugzilla.redhat.com/show_bug.cgi?id=1313457

https://bugzilla.redhat.com/show_bug.cgi?id=1314493

https://bugzilla.redhat.com/show_bug.cgi?id=1319616

https://bugzilla.redhat.com/show_bug.cgi?id=1340304

https://bugzilla.redhat.com/show_bug.cgi?id=1349042

https://bugzilla.redhat.com/show_bug.cgi?id=1361050

https://bugzilla.redhat.com/show_bug.cgi?id=1363690

https://bugzilla.redhat.com/show_bug.cgi?id=1364993

Plugin Details

Severity: Medium

ID: 94554

File Name: redhat-RHSA-2016-2591.nasl

Version: 2.16

Type: local

Agent: unix

Published: 11/4/2016

Updated: 4/15/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Low

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS Score Source: CVE-2016-3120

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:libkadm5, p-cpe:/a:redhat:enterprise_linux:krb5-server-ldap, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:krb5-pkinit, p-cpe:/a:redhat:enterprise_linux:krb5-workstation, p-cpe:/a:redhat:enterprise_linux:krb5-server, p-cpe:/a:redhat:enterprise_linux:krb5, p-cpe:/a:redhat:enterprise_linux:krb5-libs, p-cpe:/a:redhat:enterprise_linux:krb5-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/3/2016

Vulnerability Publication Date: 3/26/2016

Reference Information

CVE: CVE-2016-3119, CVE-2016-3120

CWE: 476

RHSA: 2016:2591