ID CVE-2011-0284
Summary Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
References
Vulnerable Configurations
  • MIT Kerberos 5 1.7
    cpe:2.3:a:mit:kerberos:5-1.7
  • MIT Kerberos 5 1.7.1
    cpe:2.3:a:mit:kerberos:5-1.7.1
  • MIT Kerberos 5 1.8
    cpe:2.3:a:mit:kerberos:5-1.8
  • MIT Kerberos 5 1.8.1
    cpe:2.3:a:mit:kerberos:5-1.8.1
  • MIT Kerberos 5 1.8.2
    cpe:2.3:a:mit:kerberos:5-1.8.2
  • MIT Kerberos 5 1.8.3
    cpe:2.3:a:mit:kerberos:5-1.8.3
  • MIT Kerberos 5 1.9
    cpe:2.3:a:mit:kerberos:5-1.9
CVSS
Base: 7.6 (as of 21-03-2011 - 12:03)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_KRB5-110316.NASL
    description A double-free issue in kdc when PKINIT is enabled allowed remote attackers to crash the daemon or potentially execute arbitrary code (CVE-2011-0284).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 75561
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75561
    title openSUSE Security Update : krb5 (krb5-4163)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201201-13.NASL
    description The remote host is affected by the vulnerability described in GLSA-201201-13 (MIT Kerberos 5: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in MIT Kerberos 5. Please review the CVE identifiers referenced below for details. Impact : A remote attacker may be able to execute arbitrary code with the privileges of the administration daemon or the Key Distribution Center (KDC) daemon, cause a Denial of Service condition, or possibly obtain sensitive information. Furthermore, a remote attacker may be able to spoof Kerberos authorization, modify KDC responses, forge user data messages, forge tokens, forge signatures, impersonate a client, modify user-visible prompt text, or have other unspecified impact. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 57655
    published 2012-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57655
    title GLSA-201201-13 : MIT Kerberos 5: Multiple vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-3464.NASL
    description This update incorporates upstream fixes for a double-free in the KDC which could occur if the KDC needed to send back typed-data along with an error (MITKRB5-SA-2011-003, CVE-2011-0284). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 52965
    published 2011-03-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52965
    title Fedora 13 : krb5-1.7.1-18.fc13 (2011-3464)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2011-0356.NASL
    description From Red Hat Security Advisory 2011:0356 : Updated krb5 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). The Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) capability provides support for using public-key authentication with Kerberos. A double-free flaw was found in the way the MIT Kerberos KDC handled initial authentication requests (AS-REQ), when the KDC was configured to provide the PKINIT capability. A remote attacker could use this flaw to cause the KDC daemon to abort by using a specially crafted AS-REQ request. (CVE-2011-0284) All krb5 users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the krb5kdc daemon will be restarted automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68230
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68230
    title Oracle Linux 6 : krb5 (ELSA-2011-0356)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-3547.NASL
    description This update incorporates upstream fixes for a double-free in the KDC which could occur if the KDC needed to send back typed-data along with an error (MITKRB5-SA-2011-003, CVE-2011-0284). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 52746
    published 2011-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52746
    title Fedora 15 : krb5-1.9-6.fc15 (2011-3547)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0356.NASL
    description Updated krb5 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). The Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) capability provides support for using public-key authentication with Kerberos. A double-free flaw was found in the way the MIT Kerberos KDC handled initial authentication requests (AS-REQ), when the KDC was configured to provide the PKINIT capability. A remote attacker could use this flaw to cause the KDC daemon to abort by using a specially crafted AS-REQ request. (CVE-2011-0284) All krb5 users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the krb5kdc daemon will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 52700
    published 2011-03-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52700
    title RHEL 6 : krb5 (RHSA-2011:0356)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1088-1.NASL
    description Cameron Meadors discovered that the MIT Kerberos 5 Key Distribution Center (KDC) daemon is vulnerable to a double-free condition if the Public Key Cryptography for Initial Authentication (PKINIT) capability is enabled. This could allow a remote attacker to cause a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 52682
    published 2011-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52682
    title Ubuntu 9.10 / 10.04 LTS / 10.10 : krb5 vulnerability (USN-1088-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_7EDAC52A66CD11E093985D45F3AA24F0.NASL
    description An advisory published by the MIT Kerberos team says : The MIT Kerberos 5 Key Distribution Center (KDC) daemon is vulnerable to a double-free condition if the Public Key Cryptography for Initial Authentication (PKINIT) capability is enabled, resulting in daemon crash or arbitrary code execution (which is believed to be difficult). An unauthenticated remote attacker can induce a double-free event, causing the KDC daemon to crash (denial of service), or to execute arbitrary code. Exploiting a double-free event to execute arbitrary code is believed to be difficult.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53443
    published 2011-04-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53443
    title FreeBSD : krb5 -- MITKRB5-SA-2011-003, KDC vulnerable to double-free when PKINIT enabled (7edac52a-66cd-11e0-9398-5d45f3aa24f0)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS11_KERBEROS_20130924_2.NASL
    description The remote Solaris system is missing necessary patches to address security updates : - The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client. (CVE-2010-1322) - MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. (CVE-2010-1323) - MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key. (CVE-2010-1324) - MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations. (CVE-2010-4020) - The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a 'KrbFastReq forgery issue.' (CVE-2010-4021) - Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data. (CVE-2011-0284)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 80653
    published 2015-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80653
    title Oracle Solaris Third-Party Patch Update : kerberos (cve_2010_1322_improper_input)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-048.NASL
    description A vulnerability was discovered and corrected in krb5 : The MIT Kerberos 5 Key Distribution Center (KDC) daemon is vulnerable to a double-free condition if the Public Key Cryptography for Initial Authentication (PKINIT) capability is enabled, resulting in daemon crash or arbitrary code execution (which is believed to be difficult) (CVE-2011-0284). The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 52730
    published 2011-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52730
    title Mandriva Linux Security Advisory : krb5 (MDVSA-2011:048)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-3462.NASL
    description This update incorporates upstream fixes for a double-free in the KDC which could occur if the KDC needed to send back typed-data along with an error (MITKRB5-SA-2011-003, CVE-2011-0284). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 52964
    published 2011-03-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52964
    title Fedora 14 : krb5-1.8.2-9.fc14 (2011-3462)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_KRB5-110316.NASL
    description A double-free issue in kdc when PKINIT is enabled allowed remote attackers to crash the daemon or potentially execute arbitrary code (CVE-2011-0284).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 75883
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75883
    title openSUSE Security Update : krb5 (krb5-4163)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_KRB5-110316.NASL
    description A double-free issue in kdc when PKINIT is enabled allowed remote attackers to crash the daemon or potentially execute arbitrary code (CVE-2011-0284).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 53744
    published 2011-05-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53744
    title openSUSE Security Update : krb5 (krb5-4163)
redhat via4
advisories
bugzilla
id 674325
title CVE-2011-0284 krb5 (krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhba:tst:20111656001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhba:tst:20111656002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhba:tst:20111656003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20111656004
  • OR
    • AND
      • comment krb5-devel is earlier than 0:1.8.2-3.el6_0.6
        oval oval:com.redhat.rhsa:tst:20110356009
      • comment krb5-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863012
    • AND
      • comment krb5-libs is earlier than 0:1.8.2-3.el6_0.6
        oval oval:com.redhat.rhsa:tst:20110356015
      • comment krb5-libs is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863016
    • AND
      • comment krb5-pkinit-openssl is earlier than 0:1.8.2-3.el6_0.6
        oval oval:com.redhat.rhsa:tst:20110356005
      • comment krb5-pkinit-openssl is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863008
    • AND
      • comment krb5-server is earlier than 0:1.8.2-3.el6_0.6
        oval oval:com.redhat.rhsa:tst:20110356007
      • comment krb5-server is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863010
    • AND
      • comment krb5-server-ldap is earlier than 0:1.8.2-3.el6_0.6
        oval oval:com.redhat.rhsa:tst:20110356011
      • comment krb5-server-ldap is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863006
    • AND
      • comment krb5-workstation is earlier than 0:1.8.2-3.el6_0.6
        oval oval:com.redhat.rhsa:tst:20110356013
      • comment krb5-workstation is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100863014
rhsa
id RHSA-2011:0356
released 2011-03-16
severity Important
title RHSA-2011:0356: krb5 security update (Important)
rpms
  • krb5-devel-0:1.8.2-3.el6_0.6
  • krb5-libs-0:1.8.2-3.el6_0.6
  • krb5-pkinit-openssl-0:1.8.2-3.el6_0.6
  • krb5-server-0:1.8.2-3.el6_0.6
  • krb5-server-ldap-0:1.8.2-3.el6_0.6
  • krb5-workstation-0:1.8.2-3.el6_0.6
refmap via4
bid 46881
bugtraq 20110315 MITKRB5-SA-2011-003 [CVE-2011-0284] KDC double-free when PKINIT enabled
cert-vn VU#943220
confirm http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
fedora
  • FEDORA-2011-3462
  • FEDORA-2011-3464
  • FEDORA-2011-3547
mandriva MDVSA-2011:048
osvdb 71183
sectrack 1025216
secunia
  • 43700
  • 43760
  • 43783
  • 43881
suse SUSE-SR:2011:005
ubuntu USN-1088-1
vupen
  • ADV-2011-0672
  • ADV-2011-0673
  • ADV-2011-0680
  • ADV-2011-0722
  • ADV-2011-0763
xf kerberos-perpareerroras-code-execution(66101)
Last major update 11-02-2014 - 23:26
Published 19-03-2011 - 22:00
Last modified 10-10-2018 - 16:09
Back to Top