pull up fix for kpasswd service ping-pong attack
- pull up fix for UDP ping-pong flaw in kpasswd service (CVE-2002-2443, #962531,#962534)
This commit is contained in:
		
							parent
							
								
									c0d2f3b96d
								
							
						
					
					
						commit
						fbd06d348b
					
				
							
								
								
									
										64
									
								
								krb5-1.11.2-kpasswd_pingpong.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										64
									
								
								krb5-1.11.2-kpasswd_pingpong.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,64 @@ | |||||||
|  | commit cf1a0c411b2668c57c41e9c4efd15ba17b6b322c | ||||||
|  | Author: Tom Yu <tlyu@mit.edu> | ||||||
|  | Date:   Fri May 3 16:26:46 2013 -0400 | ||||||
|  | 
 | ||||||
|  |     Fix kpasswd UDP ping-pong [CVE-2002-2443] | ||||||
|  |      | ||||||
|  |     The kpasswd service provided by kadmind was vulnerable to a UDP | ||||||
|  |     "ping-pong" attack [CVE-2002-2443].  Don't respond to packets unless | ||||||
|  |     they pass some basic validation, and don't respond to our own error | ||||||
|  |     packets. | ||||||
|  |      | ||||||
|  |     Some authors use CVE-1999-0103 to refer to the kpasswd UDP ping-pong | ||||||
|  |     attack or UDP ping-pong attacks in general, but there is discussion | ||||||
|  |     leading toward narrowing the definition of CVE-1999-0103 to the echo, | ||||||
|  |     chargen, or other similar built-in inetd services. | ||||||
|  |      | ||||||
|  |     Thanks to Vincent Danen for alerting us to this issue. | ||||||
|  |      | ||||||
|  |     CVSSv2: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:P/RL:O/RC:C | ||||||
|  |      | ||||||
|  |     ticket: 7637 (new) | ||||||
|  |     target_version: 1.11.3 | ||||||
|  |     tags: pullup | ||||||
|  | 
 | ||||||
|  | diff --git a/src/kadmin/server/schpw.c b/src/kadmin/server/schpw.c
 | ||||||
|  | index 15b0ab5..7f455d8 100644
 | ||||||
|  | --- a/src/kadmin/server/schpw.c
 | ||||||
|  | +++ b/src/kadmin/server/schpw.c
 | ||||||
|  | @@ -52,7 +52,7 @@ process_chpw_request(krb5_context context, void *server_handle, char *realm,
 | ||||||
|  |          ret = KRB5KRB_AP_ERR_MODIFIED; | ||||||
|  |          numresult = KRB5_KPASSWD_MALFORMED; | ||||||
|  |          strlcpy(strresult, "Request was truncated", sizeof(strresult)); | ||||||
|  | -        goto chpwfail;
 | ||||||
|  | +        goto bailout;
 | ||||||
|  |      } | ||||||
|  |   | ||||||
|  |      ptr = req->data; | ||||||
|  | @@ -67,7 +67,7 @@ process_chpw_request(krb5_context context, void *server_handle, char *realm,
 | ||||||
|  |          numresult = KRB5_KPASSWD_MALFORMED; | ||||||
|  |          strlcpy(strresult, "Request length was inconsistent", | ||||||
|  |                  sizeof(strresult)); | ||||||
|  | -        goto chpwfail;
 | ||||||
|  | +        goto bailout;
 | ||||||
|  |      } | ||||||
|  |   | ||||||
|  |      /* verify version number */ | ||||||
|  | @@ -80,7 +80,7 @@ process_chpw_request(krb5_context context, void *server_handle, char *realm,
 | ||||||
|  |          numresult = KRB5_KPASSWD_BAD_VERSION; | ||||||
|  |          snprintf(strresult, sizeof(strresult), | ||||||
|  |                   "Request contained unknown protocol version number %d", vno); | ||||||
|  | -        goto chpwfail;
 | ||||||
|  | +        goto bailout;
 | ||||||
|  |      } | ||||||
|  |   | ||||||
|  |      /* read, check ap-req length */ | ||||||
|  | @@ -93,7 +93,7 @@ process_chpw_request(krb5_context context, void *server_handle, char *realm,
 | ||||||
|  |          numresult = KRB5_KPASSWD_MALFORMED; | ||||||
|  |          strlcpy(strresult, "Request was truncated in AP-REQ", | ||||||
|  |                  sizeof(strresult)); | ||||||
|  | -        goto chpwfail;
 | ||||||
|  | +        goto bailout;
 | ||||||
|  |      } | ||||||
|  |   | ||||||
|  |      /* verify ap_req */ | ||||||
| @ -30,7 +30,7 @@ | |||||||
| Summary: The Kerberos network authentication system | Summary: The Kerberos network authentication system | ||||||
| Name: krb5 | Name: krb5 | ||||||
| Version: 1.11.2 | Version: 1.11.2 | ||||||
| Release: 4%{?dist} | Release: 5%{?dist} | ||||||
| # Maybe we should explode from the now-available-to-everybody tarball instead? | # Maybe we should explode from the now-available-to-everybody tarball instead? | ||||||
| # http://web.mit.edu/kerberos/dist/krb5/1.11/krb5-1.11.2-signed.tar | # http://web.mit.edu/kerberos/dist/krb5/1.11/krb5-1.11.2-signed.tar | ||||||
| Source0: krb5-%{version}.tar.gz | Source0: krb5-%{version}.tar.gz | ||||||
| @ -77,6 +77,7 @@ Patch116: http://ausil.fedorapeople.org/aarch64/krb5/krb5-aarch64.patch | |||||||
| Patch117: krb5-1.11-gss-client-keytab.patch | Patch117: krb5-1.11-gss-client-keytab.patch | ||||||
| Patch118: krb5-1.11.1-rpcbind.patch | Patch118: krb5-1.11.1-rpcbind.patch | ||||||
| Patch119: krb5-fast-msg_type.patch | Patch119: krb5-fast-msg_type.patch | ||||||
|  | Patch120: krb5-1.11.2-kpasswd_pingpong.patch | ||||||
| 
 | 
 | ||||||
| # Patches for otp plugin backport | # Patches for otp plugin backport | ||||||
| Patch201: krb5-1.11.2-keycheck.patch | Patch201: krb5-1.11.2-keycheck.patch | ||||||
| @ -296,6 +297,7 @@ ln -s NOTICE LICENSE | |||||||
| %patch117 -p1 -b .gss-client-keytab | %patch117 -p1 -b .gss-client-keytab | ||||||
| %patch118 -p1 -b .rpcbind | %patch118 -p1 -b .rpcbind | ||||||
| %patch119 -p1 -b .fast-msg_type | %patch119 -p1 -b .fast-msg_type | ||||||
|  | %patch120 -p1 -b .kpasswd_pingpong | ||||||
| 
 | 
 | ||||||
| %patch201 -p1 -b .keycheck | %patch201 -p1 -b .keycheck | ||||||
| %patch202 -p1 -b .otp | %patch202 -p1 -b .otp | ||||||
| @ -821,6 +823,10 @@ exit 0 | |||||||
| %{_sbindir}/uuserver | %{_sbindir}/uuserver | ||||||
| 
 | 
 | ||||||
| %changelog | %changelog | ||||||
|  | * Mon May 13 2013 Nalin Dahyabhai <nalin@redhat.com> 1.11.2-5 | ||||||
|  | - pull up fix for UDP ping-pong flaw in kpasswd service (CVE-2002-2443, | ||||||
|  |   #962531,#962534) | ||||||
|  | 
 | ||||||
| * Mon Apr 29 2013 Nathaniel McCallum <npmccallum@redhat.com> 1.11.2-4 | * Mon Apr 29 2013 Nathaniel McCallum <npmccallum@redhat.com> 1.11.2-4 | ||||||
| - Update otp patches | - Update otp patches | ||||||
| - Merge otp patches into a single patch | - Merge otp patches into a single patch | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user