Executive Summary

Summary
Title Kerberos vulnerabilities
Informations
Name USN-2810-1 First vendor Publication 2015-11-12
Vendor Ubuntu Last vendor Modification 2015-11-12
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:C/I:C/A:C)
Cvss Base Score 8.5 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 6.8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10 - Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in Kerberos.

Software Description: - krb5: MIT Kerberos Network Authentication Protocol

Details:

It was discovered that the Kerberos kpasswd service incorrectly handled certain UDP packets. A remote attacker could possibly use this issue to cause resource consumption, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS. (CVE-2002-2443)

It was discovered that Kerberos incorrectly handled null bytes in certain data fields. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-5355)

It was discovered that the Kerberos kdcpreauth modules incorrectly tracked certain client requests. A remote attacker could possibly use this issue to bypass intended preauthentication requirements. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-2694)

It was discovered that Kerberos incorrectly handled certain SPNEGO packets. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2695)

It was discovered that Kerberos incorrectly handled certain IAKERB packets. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2696, CVE-2015-2698)

It was discovered that Kerberos incorrectly handled certain TGS requests. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2015-2697)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 15.10:
krb5-admin-server 1.13.2+dfsg-2ubuntu0.1
krb5-k5tls 1.13.2+dfsg-2ubuntu0.1
krb5-kdc 1.13.2+dfsg-2ubuntu0.1
krb5-kdc-ldap 1.13.2+dfsg-2ubuntu0.1
krb5-otp 1.13.2+dfsg-2ubuntu0.1
krb5-pkinit 1.13.2+dfsg-2ubuntu0.1
krb5-user 1.13.2+dfsg-2ubuntu0.1
libgssapi-krb5-2 1.13.2+dfsg-2ubuntu0.1
libgssrpc4 1.13.2+dfsg-2ubuntu0.1
libk5crypto3 1.13.2+dfsg-2ubuntu0.1
libkadm5clnt-mit9 1.13.2+dfsg-2ubuntu0.1
libkdb5-8 1.13.2+dfsg-2ubuntu0.1
libkrad0 1.13.2+dfsg-2ubuntu0.1
libkrb5-3 1.13.2+dfsg-2ubuntu0.1
libkrb5support0 1.13.2+dfsg-2ubuntu0.1

Ubuntu 15.04:
krb5-admin-server 1.12.1+dfsg-18ubuntu0.1
krb5-kdc 1.12.1+dfsg-18ubuntu0.1
krb5-kdc-ldap 1.12.1+dfsg-18ubuntu0.1
krb5-otp 1.12.1+dfsg-18ubuntu0.1
krb5-pkinit 1.12.1+dfsg-18ubuntu0.1
krb5-user 1.12.1+dfsg-18ubuntu0.1
libgssapi-krb5-2 1.12.1+dfsg-18ubuntu0.1
libgssrpc4 1.12.1+dfsg-18ubuntu0.1
libk5crypto3 1.12.1+dfsg-18ubuntu0.1
libkadm5clnt-mit9 1.12.1+dfsg-18ubuntu0.1
libkdb5-7 1.12.1+dfsg-18ubuntu0.1
libkrad0 1.12.1+dfsg-18ubuntu0.1
libkrb5-3 1.12.1+dfsg-18ubuntu0.1
libkrb5support0 1.12.1+dfsg-18ubuntu0.1

Ubuntu 14.04 LTS:
krb5-admin-server 1.12+dfsg-2ubuntu5.2
krb5-kdc 1.12+dfsg-2ubuntu5.2
krb5-kdc-ldap 1.12+dfsg-2ubuntu5.2
krb5-otp 1.12+dfsg-2ubuntu5.2
krb5-pkinit 1.12+dfsg-2ubuntu5.2
krb5-user 1.12+dfsg-2ubuntu5.2
libgssapi-krb5-2 1.12+dfsg-2ubuntu5.2
libgssrpc4 1.12+dfsg-2ubuntu5.2
libk5crypto3 1.12+dfsg-2ubuntu5.2
libkadm5clnt-mit9 1.12+dfsg-2ubuntu5.2
libkdb5-7 1.12+dfsg-2ubuntu5.2
libkrad0 1.12+dfsg-2ubuntu5.2
libkrb5-3 1.12+dfsg-2ubuntu5.2
libkrb5support0 1.12+dfsg-2ubuntu5.2

Ubuntu 12.04 LTS:
krb5-admin-server 1.10+dfsg~beta1-2ubuntu0.7
krb5-kdc 1.10+dfsg~beta1-2ubuntu0.7
krb5-kdc-ldap 1.10+dfsg~beta1-2ubuntu0.7
krb5-pkinit 1.10+dfsg~beta1-2ubuntu0.7
krb5-user 1.10+dfsg~beta1-2ubuntu0.7
libgssapi-krb5-2 1.10+dfsg~beta1-2ubuntu0.7
libgssrpc4 1.10+dfsg~beta1-2ubuntu0.7
libk5crypto3 1.10+dfsg~beta1-2ubuntu0.7
libkadm5clnt-mit8 1.10+dfsg~beta1-2ubuntu0.7
libkdb5-6 1.10+dfsg~beta1-2ubuntu0.7
libkrb5-3 1.10+dfsg~beta1-2ubuntu0.7
libkrb53 1.10+dfsg~beta1-2ubuntu0.7
libkrb5support0 1.10+dfsg~beta1-2ubuntu0.7

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2810-1
CVE-2002-2443, CVE-2014-5355, CVE-2015-2694, CVE-2015-2695,
CVE-2015-2696, CVE-2015-2697, CVE-2015-2698

Package Information:
https://launchpad.net/ubuntu/+source/krb5/1.13.2+dfsg-2ubuntu0.1
https://launchpad.net/ubuntu/+source/krb5/1.12.1+dfsg-18ubuntu0.1
https://launchpad.net/ubuntu/+source/krb5/1.12+dfsg-2ubuntu5.2
https://launchpad.net/ubuntu/+source/krb5/1.10+dfsg~beta1-2ubuntu0.7

Original Source

Url : http://www.ubuntu.com/usn/USN-2810-1

CWE : Common Weakness Enumeration

% Id Name
17 % CWE-763 Release of Invalid Pointer or Reference
17 % CWE-264 Permissions, Privileges, and Access Controls
17 % CWE-125 Out-of-bounds Read
17 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
17 % CWE-20 Improper Input Validation
17 % CWE-18 Source Code

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18463
 
Oval ID: oval:org.mitre.oval:def:18463
Title: DSA-2701-1 krb5 - denial of service
Description: It was discovered that the kpasswd service running on UDP port 464 could respond to response packets, creating a packet loop and a denial of service condition.
Family: unix Class: patch
Reference(s): DSA-2701-1
CVE-2002-2443
Version: 8
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21141
 
Oval ID: oval:org.mitre.oval:def:21141
Title: RHSA-2013:0942: krb5 security update (Moderate)
Description: schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
Family: unix Class: patch
Reference(s): RHSA-2013:0942-01
CESA-2013:0942
CVE-2002-2443
Version: 4
Platform(s): Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 5
CentOS Linux 5
CentOS Linux 6
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23478
 
Oval ID: oval:org.mitre.oval:def:23478
Title: DEPRECATED: ELSA-2013:0942: krb5 security update (Moderate)
Description: schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
Family: unix Class: patch
Reference(s): ELSA-2013:0942-01
CVE-2002-2443
Version: 7
Platform(s): Oracle Linux 6
Oracle Linux 5
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23920
 
Oval ID: oval:org.mitre.oval:def:23920
Title: ELSA-2013:0942: krb5 security update (Moderate)
Description: schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
Family: unix Class: patch
Reference(s): ELSA-2013:0942-01
CVE-2002-2443
Version: 6
Platform(s): Oracle Linux 6
Oracle Linux 5
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25824
 
Oval ID: oval:org.mitre.oval:def:25824
Title: SUSE-SU-2013:1190-1 -- Security update for krb5
Description: This krb5 update fixes a security issue. * kpasswd UDP ping-pong (bug#825985 / CVE-2002-2443) Security Issue reference: * CVE-2002-2443 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443 >
Family: unix Class: patch
Reference(s): SUSE-SU-2013:1190-1
CVE-2002-2443
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Server 10
SUSE Linux Enterprise Desktop 11
SUSE Linux Enterprise Desktop 10
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27603
 
Oval ID: oval:org.mitre.oval:def:27603
Title: DEPRECATED: ELSA-2013-0942 -- krb5 security update (moderate)
Description: [1.10.3-10.3] - pull up fix for UDP ping-pong flaw in kpasswd service (CVE-2002-2443,
Family: unix Class: patch
Reference(s): ELSA-2013-0942
CVE-2002-2443
Version: 4
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): krb5
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28832
 
Oval ID: oval:org.mitre.oval:def:28832
Title: AIX NAS Denial of Service via a zero-byte version string or by omitting the '\0' character
Description: MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
Family: unix Class: vulnerability
Reference(s): CVE-2014-5355
Version: 4
Platform(s): IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 78
Os 4
Os 4
Os 3
Os 1
Os 5
Os 1
Os 2
Os 2
Os 2
Os 1
Os 2
Os 3
Os 3
Os 3

Information Assurance Vulnerability Management (IAVM)

Date Description
2015-05-28 IAVM : 2015-B-0069 - Multiple Vulnerabilities in MIT Kerberos 5
Severity : Category I - VMSKEY : V0060811

Snort® IPS/IDS

Date Description
2020-01-07 MIT Kerberos 5 krb5_read_message ksh protocol bad sendauth version length den...
RuleID : 52392 - Revision : 1 - Type : SERVER-OTHER
2020-01-07 MIT Kerberos 5 krb5_read_message ksh protocol bad sendauth version length den...
RuleID : 52391 - Revision : 1 - Type : SERVER-OTHER
2020-01-07 MIT Kerberos 5 krb5_read_message klogin ksh kprop protocols bad app version s...
RuleID : 52390 - Revision : 1 - Type : SERVER-OTHER
2020-01-07 MIT Kerberos 5 krb5_read_message klogin ksh kprop protocols bad app version s...
RuleID : 52389 - Revision : 1 - Type : SERVER-OTHER
2020-01-07 MIT Kerberos 5 krb5_read_message klogin ksh kprop protocols bad sendauth vers...
RuleID : 52388 - Revision : 1 - Type : SERVER-OTHER
2020-01-07 MIT Kerberos 5 krb5_read_message kprop protocol bad sendauth version length d...
RuleID : 52387 - Revision : 1 - Type : SERVER-OTHER
2020-01-07 MIT Kerberos 5 krb5_read_message klogin ksh kprop protocols bad app version l...
RuleID : 52386 - Revision : 1 - Type : SERVER-OTHER
2020-01-07 MIT Kerberos 5 krb5_read_message klogin protocol bad sendauth or app version ...
RuleID : 52385 - Revision : 1 - Type : SERVER-OTHER
2020-01-07 MIT Kerberos 5 krb5_read_message klogin ksh kprop protocols bad sendauth vers...
RuleID : 52384 - Revision : 1 - Type : SERVER-OTHER
2019-09-24 MIT Kerberos kpasswd UDP denial of service attempt
RuleID : 51212 - Revision : 1 - Type : SERVER-OTHER
2015-07-08 MIT Kerberos 5 krb5_read_message denial of service attempt
RuleID : 34709 - Revision : 4 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2018-02-01 Name : The remote Debian host is missing a security update.
File : debian_DLA-1265.nasl - Type : ACT_GATHER_INFO
2016-11-21 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201611-14.nasl - Type : ACT_GATHER_INFO
2016-03-24 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2016-0039.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-be1b87a3b7.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-58ae075703.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-200d2dfd9f.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-1b9c33d713.nasl - Type : ACT_GATHER_INFO
2015-12-29 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-961.nasl - Type : ACT_GATHER_INFO
2015-12-22 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20151119_krb5_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2015-12-21 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-2302-1.nasl - Type : ACT_GATHER_INFO
2015-12-18 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-2294-1.nasl - Type : ACT_GATHER_INFO
2015-12-15 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2015-624.nasl - Type : ACT_GATHER_INFO
2015-12-02 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-2154.nasl - Type : ACT_GATHER_INFO
2015-11-24 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2015-2154.nasl - Type : ACT_GATHER_INFO
2015-11-23 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-784.nasl - Type : ACT_GATHER_INFO
2015-11-20 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-740.nasl - Type : ACT_GATHER_INFO
2015-11-19 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-2154.nasl - Type : ACT_GATHER_INFO
2015-11-13 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2810-1.nasl - Type : ACT_GATHER_INFO
2015-11-09 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-709.nasl - Type : ACT_GATHER_INFO
2015-11-09 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3395.nasl - Type : ACT_GATHER_INFO
2015-11-09 Name : The remote Debian host is missing a security update.
File : debian_DLA-340.nasl - Type : ACT_GATHER_INFO
2015-11-05 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1898-1.nasl - Type : ACT_GATHER_INFO
2015-11-05 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1897-1.nasl - Type : ACT_GATHER_INFO
2015-07-24 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1282-1.nasl - Type : ACT_GATHER_INFO
2015-07-22 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1276-1.nasl - Type : ACT_GATHER_INFO
2015-06-22 Name : The remote Fedora host is missing a security update.
File : fedora_2015-7878.nasl - Type : ACT_GATHER_INFO
2015-05-29 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_406636fe055d11e5aab1d050996490d0.nasl - Type : ACT_GATHER_INFO
2015-05-28 Name : The remote AIX host has a version of NAS installed that is affected by multip...
File : aix_nas_advisory3.nasl - Type : ACT_GATHER_INFO
2015-05-12 Name : The remote Fedora host is missing a security update.
File : fedora_2015-7866.nasl - Type : ACT_GATHER_INFO
2015-05-07 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2015-518.nasl - Type : ACT_GATHER_INFO
2015-04-10 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150409_krb5_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2015-04-10 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2015-0054.nasl - Type : ACT_GATHER_INFO
2015-04-10 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2015-0794.nasl - Type : ACT_GATHER_INFO
2015-04-10 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-0794.nasl - Type : ACT_GATHER_INFO
2015-04-09 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-0794.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-069.nasl - Type : ACT_GATHER_INFO
2015-03-20 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-246.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_kerberos_20130924.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2014-0034.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2013-1076.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-546.nasl - Type : ACT_GATHER_INFO
2013-12-17 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201312-12.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-208.nasl - Type : ACT_GATHER_INFO
2013-07-14 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_krb5-8631.nasl - Type : ACT_GATHER_INFO
2013-07-14 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_krb5-130626.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0942.nasl - Type : ACT_GATHER_INFO
2013-06-14 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130612_krb5_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-06-14 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0942.nasl - Type : ACT_GATHER_INFO
2013-06-13 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0942.nasl - Type : ACT_GATHER_INFO
2013-06-04 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_e3f64457cccd11e2af76206a8a720317.nasl - Type : ACT_GATHER_INFO
2013-06-03 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2701.nasl - Type : ACT_GATHER_INFO
2013-05-26 Name : The remote Fedora host is missing a security update.
File : fedora_2013-8113.nasl - Type : ACT_GATHER_INFO
2013-05-24 Name : The remote Fedora host is missing a security update.
File : fedora_2013-8219.nasl - Type : ACT_GATHER_INFO
2013-05-22 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-166.nasl - Type : ACT_GATHER_INFO
2013-05-22 Name : The remote Fedora host is missing a security update.
File : fedora_2013-8212.nasl - Type : ACT_GATHER_INFO
2001-03-25 Name : The remote service is vulnerable to a denial of service attack.
File : krb_pingpong.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2015-11-14 13:25:53
  • Multiple Updates
2015-11-13 21:29:00
  • Multiple Updates
2015-11-13 09:29:17
  • Multiple Updates
2015-11-12 21:22:27
  • First insertion