|
|
|
Credit:
The information has been provided by iDefense Labs.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=500
|
|
Vulnerable Systems:
* Kerberos version 1.5.1 on Fedora CORE 5
Immune Systems:
* Kerberos version 1.6.1
The vulnerability exists within the server's logging function, klog_vsyslog(). A call is made to vsprintf(), with the destination buffer passed as a fixed size stack buffer. User input is not properly validated before being passed to this function, and a stack based buffer overflow can occur.
Analysis:
Exploitation allows an attacker to execute arbitrary code with root privileges on the targeted host.
In order to exploit this vulnerability, an attacker must have valid credentials stored on the server. Administrator privileges are not necessary. The kadmind server runs on the master Kerberos server. Since the master server holds the KDC principal and policy database, a compromise could lead to a compromise of multiple hosts that use the server for authentication.
Workaround:
iDefense is currently unaware of any workarounds for this issue.
Vendor response:
The MIT Kerberos team has made patches available to address this vulnerability. For more information consult their advisory at the following URL: http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt
CVE Information:
CVE-2007-0957
Disclosure Timeline:
02/08/2007 - Initial vendor notification
02/08/2007 - Initial vendor response
04/03/2007 - Coordinated public disclosure
|
|
|
|