exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-245

Mandriva Linux Security Advisory 2010-245
Posted Dec 1, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-245 - A vulnerability was discovered and corrected in krb5. An unauthenticated remote attacker could alter a SAM-2 challenge, affecting the prompt text seen by the user or the kind of response sent to the KDC. Under some circumstances, this can negate the incremental security benefit of using a single-use authentication mechanism token. An unauthenticated remote attacker has a 1/256 chance of forging KRB-SAFE messages in an application protocol if the targeted pre-existing session uses an RC4 session key. Few application protocols use KRB-SAFE messages.

tags | advisory, remote, protocol
systems | linux, mandriva
advisories | CVE-2010-1323
SHA-256 | c1eb3def1ba7ba3f94fbeddefddd6d6b778fe703923015422bedd0977a5d2938

Mandriva Linux Security Advisory 2010-245

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:245
http://www.mandriva.com/security/
_______________________________________________________________________

Package : krb5
Date : November 30, 2010
Affected: 2009.0, 2010.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

A vulnerability was discovered and corrected in krb5:

An unauthenticated remote attacker could alter a SAM-2 challenge,
affecting the prompt text seen by the user or the kind of response
sent to the KDC. Under some circumstances, this can negate the
incremental security benefit of using a single-use authentication
mechanism token. An unauthenticated remote attacker has a 1/256
chance of forging KRB-SAFE messages in an application protocol if the
targeted pre-existing session uses an RC4 session key. Few application
protocols use KRB-SAFE messages (CVE-2010-1323).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
ed005ce6d0a31c2c028b38290d2d23f7 2009.0/i586/ftp-client-krb5-1.6.3-6.6mdv2009.0.i586.rpm
b0d610dd1dd4be2658b3c3a08dcc31aa 2009.0/i586/ftp-server-krb5-1.6.3-6.6mdv2009.0.i586.rpm
791006917acdcb397c9e7689770d7c36 2009.0/i586/krb5-1.6.3-6.6mdv2009.0.i586.rpm
cb7d7518d360b46eb083039f1feee340 2009.0/i586/krb5-server-1.6.3-6.6mdv2009.0.i586.rpm
b1749fbde829029d688fde290ee1954a 2009.0/i586/krb5-workstation-1.6.3-6.6mdv2009.0.i586.rpm
99bccc78bdb574f3189d3f9880638105 2009.0/i586/libkrb53-1.6.3-6.6mdv2009.0.i586.rpm
1b21f740d4502b04ba092b450876469d 2009.0/i586/libkrb53-devel-1.6.3-6.6mdv2009.0.i586.rpm
f87d10751e70f02b709c82d755db019e 2009.0/i586/telnet-client-krb5-1.6.3-6.6mdv2009.0.i586.rpm
248584468c20980a30cbaa1f2172d93d 2009.0/i586/telnet-server-krb5-1.6.3-6.6mdv2009.0.i586.rpm
279bbdbf0c611000e9295897aac21c62 2009.0/SRPMS/krb5-1.6.3-6.6mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
89ad30c1c76ab4992c891ce6eb34716f 2009.0/x86_64/ftp-client-krb5-1.6.3-6.6mdv2009.0.x86_64.rpm
cdba6d2b6cd019ecc6881be5275091af 2009.0/x86_64/ftp-server-krb5-1.6.3-6.6mdv2009.0.x86_64.rpm
4be4ed11da0e9593861116f7f2cbb49f 2009.0/x86_64/krb5-1.6.3-6.6mdv2009.0.x86_64.rpm
e351b352e276d4ea44cca84e1e7e6c74 2009.0/x86_64/krb5-server-1.6.3-6.6mdv2009.0.x86_64.rpm
d6781f21f0a0c954510a3855f7075d74 2009.0/x86_64/krb5-workstation-1.6.3-6.6mdv2009.0.x86_64.rpm
151dec2c24b9ff1e608f2cd1daa1042e 2009.0/x86_64/lib64krb53-1.6.3-6.6mdv2009.0.x86_64.rpm
c9c041aa74f5114ccbb1ad728abd98d9 2009.0/x86_64/lib64krb53-devel-1.6.3-6.6mdv2009.0.x86_64.rpm
6018f8c6a827bd917700bfd9fb16aa63 2009.0/x86_64/telnet-client-krb5-1.6.3-6.6mdv2009.0.x86_64.rpm
f09f8fabb70fd09f4b6be10cfc97f647 2009.0/x86_64/telnet-server-krb5-1.6.3-6.6mdv2009.0.x86_64.rpm
279bbdbf0c611000e9295897aac21c62 2009.0/SRPMS/krb5-1.6.3-6.6mdv2009.0.src.rpm

Mandriva Linux 2010.0:
87781c261341cfa333bfbaa67886d3f5 2010.0/i586/ftp-client-krb5-1.6.3-10.4mdv2010.0.i586.rpm
e2e72dcbc91a2eb01bcf9ef618861672 2010.0/i586/ftp-server-krb5-1.6.3-10.4mdv2010.0.i586.rpm
6f8be2e3c308af75a82cf37be72a0ac5 2010.0/i586/krb5-1.6.3-10.4mdv2010.0.i586.rpm
fdb3c95ad58aff10a70009368c4ce683 2010.0/i586/krb5-server-1.6.3-10.4mdv2010.0.i586.rpm
5f346e92394af1d6f801d53024247575 2010.0/i586/krb5-workstation-1.6.3-10.4mdv2010.0.i586.rpm
f02253d397b5ea221af118e576af6114 2010.0/i586/libkrb53-1.6.3-10.4mdv2010.0.i586.rpm
4f837b840be0655ab513fcf8054aee3d 2010.0/i586/libkrb53-devel-1.6.3-10.4mdv2010.0.i586.rpm
dd4b4c5c204a6f53e2a074b83d95f6fe 2010.0/i586/telnet-client-krb5-1.6.3-10.4mdv2010.0.i586.rpm
d9f470d10eb7f7dc5838d2b42e09e2bf 2010.0/i586/telnet-server-krb5-1.6.3-10.4mdv2010.0.i586.rpm
155600292f04d42d823e543c67c6820e 2010.0/SRPMS/krb5-1.6.3-10.4mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
a98a5d9be4ec2f8ce8cbc1e529f01a18 2010.0/x86_64/ftp-client-krb5-1.6.3-10.4mdv2010.0.x86_64.rpm
1c37919f956303ccdb0367b5099dce95 2010.0/x86_64/ftp-server-krb5-1.6.3-10.4mdv2010.0.x86_64.rpm
e1fa476906a1c39fea82af54e5ef46ea 2010.0/x86_64/krb5-1.6.3-10.4mdv2010.0.x86_64.rpm
5fae3c064f42ac15c3d76b62ed1d31a8 2010.0/x86_64/krb5-server-1.6.3-10.4mdv2010.0.x86_64.rpm
16ec6abe879d88f2e64d602979d68251 2010.0/x86_64/krb5-workstation-1.6.3-10.4mdv2010.0.x86_64.rpm
0fa9d14d9b6a0ca3bcba6ced67d80974 2010.0/x86_64/lib64krb53-1.6.3-10.4mdv2010.0.x86_64.rpm
6ba4fda406959d55a34ba1e3f2663ae6 2010.0/x86_64/lib64krb53-devel-1.6.3-10.4mdv2010.0.x86_64.rpm
c74854e156d72aaf6eb0cc4f6e9839dd 2010.0/x86_64/telnet-client-krb5-1.6.3-10.4mdv2010.0.x86_64.rpm
ae0c89a59476046c9f59e2a6b18dcb57 2010.0/x86_64/telnet-server-krb5-1.6.3-10.4mdv2010.0.x86_64.rpm
155600292f04d42d823e543c67c6820e 2010.0/SRPMS/krb5-1.6.3-10.4mdv2010.0.src.rpm

Corporate 4.0:
dec2633783c4b665b92ad399b9a51660 corporate/4.0/i586/ftp-client-krb5-1.4.3-5.10.20060mlcs4.i586.rpm
380be1fc294337f204641917774b70df corporate/4.0/i586/ftp-server-krb5-1.4.3-5.10.20060mlcs4.i586.rpm
114bc5ea49aef4326cd0794637a87c17 corporate/4.0/i586/krb5-server-1.4.3-5.10.20060mlcs4.i586.rpm
33373aa43ace9fe599e1048878cca829 corporate/4.0/i586/krb5-workstation-1.4.3-5.10.20060mlcs4.i586.rpm
7d4f74b48d73c0bca75a0f72bcc0921a corporate/4.0/i586/libkrb53-1.4.3-5.10.20060mlcs4.i586.rpm
289e9317d9a3d690bba2a6a0caf759f4 corporate/4.0/i586/libkrb53-devel-1.4.3-5.10.20060mlcs4.i586.rpm
363af388e65141a65565fa486943546e corporate/4.0/i586/telnet-client-krb5-1.4.3-5.10.20060mlcs4.i586.rpm
b5cd78bb4a17d65c55c0f65080b2506a corporate/4.0/i586/telnet-server-krb5-1.4.3-5.10.20060mlcs4.i586.rpm
391a77d92c277bbeb019c929d90a467c corporate/4.0/SRPMS/krb5-1.4.3-5.10.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
8167696ba48bb72abb4139a21ea28124 corporate/4.0/x86_64/ftp-client-krb5-1.4.3-5.10.20060mlcs4.x86_64.rpm
fbe0e8826e8d9de4219c4fe6d8522869 corporate/4.0/x86_64/ftp-server-krb5-1.4.3-5.10.20060mlcs4.x86_64.rpm
6a78b2837dceb16aa2b89c1b1e37a141 corporate/4.0/x86_64/krb5-server-1.4.3-5.10.20060mlcs4.x86_64.rpm
a614abee8d842b32ae7e77f12a5cb5e8 corporate/4.0/x86_64/krb5-workstation-1.4.3-5.10.20060mlcs4.x86_64.rpm
8454424927b830e424fc2005353d90ee corporate/4.0/x86_64/lib64krb53-1.4.3-5.10.20060mlcs4.x86_64.rpm
a145126429abd891937c02d515381cc1 corporate/4.0/x86_64/lib64krb53-devel-1.4.3-5.10.20060mlcs4.x86_64.rpm
c637967bef7c5841aa9450ff6e94309e corporate/4.0/x86_64/telnet-client-krb5-1.4.3-5.10.20060mlcs4.x86_64.rpm
5cf49d35408a884e297dca2f823ca3ec corporate/4.0/x86_64/telnet-server-krb5-1.4.3-5.10.20060mlcs4.x86_64.rpm
391a77d92c277bbeb019c929d90a467c corporate/4.0/SRPMS/krb5-1.4.3-5.10.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFM9XQTmqjQ0CJFipgRAnOaAJwIYhVA9gWRrDzj2mE5gDDWtjtYiwCg6XtA
oYFGcxfeSST1fNaz2CepxeY=
=FXu1
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close