Bugzilla – Bug 825985
VUL-0: krb5: CVE-2002-2443: Fix kpasswd UDP ping-pong
Last modified: 2018-12-16 15:36:52 UTC
Public via: http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637 Fix kpasswd UDP ping-pong [CVE-2002-2443] The kpasswd service provided by kadmind was vulnerable to a UDP "ping-pong" attack [CVE-2002-2443]. Don't respond to packets unless they pass some basic validation, and don't respond to our own error packets. Some authors use CVE-1999-0103 to refer to the kpasswd UDP ping-pong attack or UDP ping-pong attacks in general, but there is discussion leading toward narrowing the definition of CVE-1999-0103 to the echo, chargen, or other similar built-in inetd services. Thanks to Vincent Danen for alerting us to this issue. Reference: https://bugzilla.redhat.com/show_bug.cgi?id=962531 https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
bugbot adjusting priority
Packages submitted and start a maintenance request. re-assign to security team for tracking
The SWAMPID for this issue is 53243. This issue was rated as moderate. Please submit fixed packages until 2013-07-10. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
This is an autogenerated message for OBS integration: This bug (825985) was mentioned in https://build.opensuse.org/request/show/181204 Evergreen:11.2 / krb5
openSUSE-SU-2013:1119-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 825985 CVE References: CVE-2002-2443 Sources used: openSUSE 12.3 (src): krb5-1.10.2-10.17.1, krb5-doc-1.10.2-10.17.2, krb5-mini-1.10.2-10.17.1 openSUSE 12.2 (src): krb5-1.10.2-3.20.1, krb5-doc-1.10.2-3.20.2, krb5-mini-1.10.2-3.20.1
This is an autogenerated message for OBS integration: This bug (825985) was mentioned in https://build.opensuse.org/request/show/181756 Evergreen:11.2 / krb5
released now.
Update released for: krb5, krb5-32bit, krb5-apps-clients, krb5-apps-servers, krb5-client, krb5-debuginfo, krb5-debuginfo-32bit, krb5-debuginfo-x86, krb5-debugsource, krb5-devel, krb5-devel-32bit, krb5-server, krb5-x86 Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SDK 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
Update released for: krb5, krb5-32bit, krb5-apps-clients, krb5-apps-servers, krb5-client, krb5-debuginfo, krb5-debuginfo-32bit, krb5-debuginfo-x86, krb5-debugsource, krb5-devel, krb5-devel-32bit, krb5-server, krb5-x86 Products: SLE-DEBUGINFO 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP2 (i386, x86_64) SLE-SDK 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLE-SERVER 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP2 (i386, x86_64)
Update released for: krb5, krb5-32bit, krb5-64bit, krb5-apps-clients, krb5-apps-servers, krb5-client, krb5-debuginfo, krb5-devel, krb5-devel-32bit, krb5-devel-64bit, krb5-server, krb5-x86 Products: SLE-DEBUGINFO 10-SP4 (i386, ia64, ppc, s390x, x86_64) SLE-DESKTOP 10-SP4 (i386, x86_64) SLE-SDK 10-SP4 (i386, ia64, ppc, s390x, x86_64) SLE-SERVER 10-SP4 (i386, ia64, ppc, s390x, x86_64)
(In reply to comment #18) > Can we please get 32-bit krb5 PTFs? As in, something like > krb5-32bit-1.6.3-133.46.1.x86_64.rpm. my understanding is that now all version and all flavors are part of security update that is released.
Closing.
(In reply to comment #23) > Closing. I am afraid public release missing the SLES11 SP1 fix for both 32 and 64 bits, so I am re-opening.
*** Bug 871411 has been marked as a duplicate of this bug. ***