FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

krb5 -- multiple checksum handling vulnerabilities

Affected packages
1.7.0 <= krb5 < 1.7.2
1.8.0 <= krb5 <= 1.8.3

Details

VuXML ID 0d57c1d9-03f4-11e0-bf50-001a926c7637
Discovery 2010-11-30
Entry 2010-12-09

The MIT Kerberos team reports:

MIT krb incorrectly accepts an unkeyed checksum with DES session keys for version 2 (RFC 4121) of the GSS-API krb5 mechanism.

An unauthenticated remote attacker can forge GSS tokens that are intended to be integrity-protected but unencrypted, if the targeted pre-existing application session uses a DES session key.

MIT krb5 KDC incorrectly accepts RFC 3961 key-derivation checksums using RC4 keys when verifying the req-checksum in a KrbFastArmoredReq.

An unauthenticated remote attacker has a 1/256 chance of swapping a client-issued KrbFastReq into a different KDC-REQ, if the armor key is RC4. The consequences are believed to be minor.

References

Bugtraq ID 45116
CVE Name CVE-2010-1324
URL http://osvdb.org/69609
URL http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt