Bug 888697 (CVE-2014-4343) - VUL-0: krb5: CVE-2014-4343 CVE-2014-4344: krb5: multiple flaws in SPNEGO
Summary: VUL-0: krb5: CVE-2014-4343 CVE-2014-4344: krb5: multiple flaws in SPNEGO
Status: RESOLVED FIXED
Alias: CVE-2014-4343
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2014-08-12
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/103912/
Whiteboard: maint:released:sle11-sp1:58452 maint...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-07-24 06:38 UTC by Victor Pereira
Modified: 2014-09-01 09:57 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2014-07-24 06:38:48 UTC
CVE-2014-4343: double-free flaw in SPNEGO initiators

A double-free flaw was found in the MIT Kerberos SPNEGO initiators. An attacker able to spoof packets to appear as though they are from an GSSAPI acceptor could use this flaw to crash a client application that uses MIT Kerberos.

It is reported that this issue affects version 1.10 and later.

Upstream commit and further details:

https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f

CVE-2014-4344: pointer dereference flaw in SPNEGO acceptor for continuation 

A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO acceptor for continuation tokens. An unauthenticated attacker could use this flaw to crash the server acceptor.

It is reported that this issue affects version 1.5 and later.

Upstream commit and further details:

https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1121876
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4343
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-4343.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343
Comment 2 Swamp Workflow Management 2014-07-24 22:00:19 UTC
bugbot adjusting priority
Comment 6 Bernhard Wiedemann 2014-07-28 11:00:13 UTC
This is an autogenerated message for OBS integration:
This bug (888697) was mentioned in
https://build.opensuse.org/request/show/242701 13.1+12.3 / krb5+krb5-mini+krb5-doc
Comment 10 Swamp Workflow Management 2014-07-29 06:44:34 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2014-08-12.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/58451
Comment 11 SMASH SMASH 2014-07-29 06:45:15 UTC
Affected packages:

SLE-11-SP3: krb5
Comment 12 SMASH SMASH 2014-07-29 07:05:14 UTC
Affected packages:

SLE-10-SP3-TERADATA: krb5
SLE-11-SP3: krb5
Comment 13 Swamp Workflow Management 2014-08-11 08:06:35 UTC
openSUSE-SU-2014:0977-1: An update that fixes four vulnerabilities is now available.

Category: security (low)
Bug References: 886016,888697
CVE References: CVE-2014-4341,CVE-2014-4342,CVE-2014-4343,CVE-2014-4344
Sources used:
openSUSE 13.1 (src):    krb5-1.11.3-3.8.1, krb5-mini-1.11.3-3.8.1
openSUSE 12.3 (src):    krb5-1.10.2-10.26.1, krb5-doc-1.10.2-10.26.2, krb5-mini-1.10.2-10.26.1
Comment 14 Swamp Workflow Management 2014-08-11 17:04:50 UTC
SUSE-SU-2014:0989-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 886016,888697
CVE References: CVE-2014-4341,CVE-2014-4342,CVE-2014-4343,CVE-2014-4344
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    krb5-1.6.3-133.49.60.1
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    krb5-1.6.3-133.49.60.1, krb5-doc-1.6.3-133.49.60.1, krb5-plugins-1.6.3-133.49.60.1
SUSE Linux Enterprise Server 11 SP3 (src):    krb5-1.6.3-133.49.60.1, krb5-doc-1.6.3-133.49.60.1, krb5-plugins-1.6.3-133.49.60.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    krb5-1.6.3-133.49.60.1
Comment 15 Marcus Meissner 2014-09-01 09:57:23 UTC
was released