View Previous Alerts

Alert (TA07-093B)

MIT Kerberos Vulnerabilities

Original Release date: April 03, 2007 | Last revised: --

Systems Affected

Other products based on the GSS-API or the RPC libraries provided with MIT Kerberos may also be affected.

Overview

The MIT Kerberos 5 implementation contains several vulnerabilities. One of these vulnerabilities (VU#220816) could allow a remote, unauthenticated attacker to log in via telnet (23/tcp) with elevated privileges. The other vulnerabilities (VU#704024, VU#419344) could allow a remote, authenticated attacker to execute arbitrary code on a Key Distribution Center (KDC).

Description

There are three vulnerabilities that affect MIT Kerberos 5:

Impact

In the case of VU#220816 a remote attacker could log on to the system via telnet and gain elevated privileges.

In the case of VU#704024 and VU#419344, a remote, authenticated attacker may be able to execute arbitrary code on KDCs, systems running kadmind, and application servers that use the RPC or GSS-API libraries. An attacker could also cause a denial of service on any of these systems. As a secondary impact, either one of these vulnerabilities could result in the compromise of both the KDC and an entire Kerberos realm.


Solution

Check with your vendors for patches or updates. For information about a vendor, please see the systems affected section in the individual vulnerability notes or contact your vendor directly.

Alternatively, apply the appropriate source code patches referenced in MITKRB5-SA-2007-001, MITKRB5-SA-2007-002, and MITKRB5-SA-2007-003 and recompile.

These vulnerabilities will also be addressed in krb5-1.6.1.


References


Revision History

This product is provided subject to this Notification and this Privacy & Use policy.

Document Feedback

Was this document helpful?  Yes  |   Somewhat  |   No