Vulnerabilities > CVE-2008-0948 - Buffer Errors vulnerability in MIT Kerberos 5 1.2.2

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
mit
CWE-119
critical
nessus

Summary

Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.

Vulnerable Configurations

Part Description Count
Application
Mit
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2008-0181.NASL
    descriptionUpdated krb5 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 2.1 and 3. This update has been rated as having critical security impact by the Red Hat Security Response Team. Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. A flaw was found in the way the MIT Kerberos Authentication Service and Key Distribution Center server (krb5kdc) handled Kerberos v4 protocol packets. An unauthenticated remote attacker could use this flaw to crash the krb5kdc daemon, disclose portions of its memory, or possibly execute arbitrary code using malformed or truncated Kerberos v4 protocol requests. (CVE-2008-0062, CVE-2008-0063) This issue only affected krb5kdc with Kerberos v4 protocol compatibility enabled, which is the default setting on Red Hat Enterprise Linux 4. Kerberos v4 protocol support can be disabled by adding
    last seen2020-06-01
    modified2020-06-02
    plugin id31618
    published2008-03-19
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/31618
    titleRHEL 2.1 / 3 : krb5 (RHSA-2008:0181)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2008:0181. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(31618);
      script_version ("1.30");
      script_cvs_date("Date: 2019/10/25 13:36:13");
    
      script_cve_id("CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0947", "CVE-2008-0948");
      script_bugtraq_id(28302, 28303);
      script_xref(name:"RHSA", value:"2008:0181");
    
      script_name(english:"RHEL 2.1 / 3 : krb5 (RHSA-2008:0181)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated krb5 packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 2.1 and 3.
    
    This update has been rated as having critical security impact by the
    Red Hat Security Response Team.
    
    Kerberos is a network authentication system which allows clients and
    servers to authenticate to each other through use of symmetric
    encryption and a trusted third party, the KDC.
    
    A flaw was found in the way the MIT Kerberos Authentication Service
    and Key Distribution Center server (krb5kdc) handled Kerberos v4
    protocol packets. An unauthenticated remote attacker could use this
    flaw to crash the krb5kdc daemon, disclose portions of its memory, or
    possibly execute arbitrary code using malformed or truncated Kerberos
    v4 protocol requests. (CVE-2008-0062, CVE-2008-0063)
    
    This issue only affected krb5kdc with Kerberos v4 protocol
    compatibility enabled, which is the default setting on Red Hat
    Enterprise Linux 4. Kerberos v4 protocol support can be disabled by
    adding 'v4_mode=none' (without the quotes) to the '[kdcdefaults]'
    section of /var/kerberos/krb5kdc/kdc.conf.
    
    A flaw was found in the RPC library used by the MIT Kerberos kadmind
    server. An unauthenticated remote attacker could use this flaw to
    crash kadmind. This issue only affected systems with certain resource
    limits configured and did not affect systems using default resource
    limits used by Red Hat Enterprise Linux 2.1 or 3. (CVE-2008-0948)
    
    Red Hat would like to thank MIT for reporting these issues.
    
    All krb5 users are advised to update to these erratum packages which
    contain backported fixes to correct these issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2008-0062"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2008-0063"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2008-0948"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2008:0181"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:krb5-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:krb5-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:krb5-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:krb5-workstation");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:2.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2008/03/18");
      script_set_attribute(attribute:"patch_publication_date", value:"2008/03/18");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/03/19");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(2\.1|3)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 2.1 / 3.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2008:0181";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"krb5-devel-1.2.2-48")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"krb5-libs-1.2.2-48")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"krb5-server-1.2.2-48")) flag++;
      if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"krb5-workstation-1.2.2-48")) flag++;
    
      if (rpm_check(release:"RHEL3", reference:"krb5-devel-1.2.7-68")) flag++;
      if (rpm_check(release:"RHEL3", reference:"krb5-libs-1.2.7-68")) flag++;
      if (rpm_check(release:"RHEL3", reference:"krb5-server-1.2.7-68")) flag++;
      if (rpm_check(release:"RHEL3", reference:"krb5-workstation-1.2.7-68")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "krb5-devel / krb5-libs / krb5-server / krb5-workstation");
      }
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_KRB5-5081.NASL
    descriptionThis update fixes the following security bugs in krb5/krb5-server : - CVE-2008-0062: null/dangling pointer (needs enabled krb4 support) - CVE-2008-0063: possible operations on uninitialized buffer content/information leak (needs enabled krb4 support) - CVE-2008-0947/CVE-2008-0948: out-of-bound array access in kadmind
    last seen2020-06-01
    modified2020-06-02
    plugin id31623
    published2008-03-19
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/31623
    titleopenSUSE 10 Security Update : krb5 (krb5-5081)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update krb5-5081.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(31623);
      script_version ("1.12");
      script_cvs_date("Date: 2019/10/25 13:36:32");
    
      script_cve_id("CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0947", "CVE-2008-0948");
    
      script_name(english:"openSUSE 10 Security Update : krb5 (krb5-5081)");
      script_summary(english:"Check for the krb5-5081 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update fixes the following security bugs in krb5/krb5-server :
    
      - CVE-2008-0062: null/dangling pointer (needs enabled krb4
        support) 
    
      - CVE-2008-0063: possible operations on uninitialized
        buffer content/information leak (needs enabled krb4
        support) 
    
      - CVE-2008-0947/CVE-2008-0948: out-of-bound array access
        in kadmind's RPC lib"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected krb5 packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:krb5");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:krb5-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:krb5-apps-clients");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:krb5-apps-servers");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:krb5-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:krb5-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:krb5-devel-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:krb5-server");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/03/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/03/19");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE10\.1|SUSE10\.2|SUSE10\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.1 / 10.2 / 10.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE10.1", reference:"krb5-1.4.3-19.30.6") ) flag++;
    if ( rpm_check(release:"SUSE10.1", reference:"krb5-apps-clients-1.4.3-19.30.6") ) flag++;
    if ( rpm_check(release:"SUSE10.1", reference:"krb5-apps-servers-1.4.3-19.30.6") ) flag++;
    if ( rpm_check(release:"SUSE10.1", reference:"krb5-client-1.4.3-19.30.6") ) flag++;
    if ( rpm_check(release:"SUSE10.1", reference:"krb5-devel-1.4.3-19.30.6") ) flag++;
    if ( rpm_check(release:"SUSE10.1", reference:"krb5-server-1.4.3-19.30.6") ) flag++;
    if ( rpm_check(release:"SUSE10.1", cpu:"x86_64", reference:"krb5-32bit-1.4.3-19.30.6") ) flag++;
    if ( rpm_check(release:"SUSE10.1", cpu:"x86_64", reference:"krb5-devel-32bit-1.4.3-19.30.6") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"krb5-1.5.1-23.14") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"krb5-apps-clients-1.5.1-23.14") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"krb5-apps-servers-1.5.1-23.14") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"krb5-client-1.5.1-23.14") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"krb5-devel-1.5.1-23.14") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"krb5-server-1.5.1-23.14") ) flag++;
    if ( rpm_check(release:"SUSE10.2", cpu:"x86_64", reference:"krb5-32bit-1.5.1-23.14") ) flag++;
    if ( rpm_check(release:"SUSE10.2", cpu:"x86_64", reference:"krb5-devel-32bit-1.5.1-23.14") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"krb5-1.6.2-22.4") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"krb5-apps-clients-1.6.2-22.4") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"krb5-apps-servers-1.6.2-22.4") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"krb5-client-1.6.2-22.4") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"krb5-devel-1.6.2-22.4") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"krb5-server-1.6.2-22.4") ) flag++;
    if ( rpm_check(release:"SUSE10.3", cpu:"x86_64", reference:"krb5-32bit-1.6.2-22.4") ) flag++;
    if ( rpm_check(release:"SUSE10.3", cpu:"x86_64", reference:"krb5-devel-32bit-1.6.2-22.4") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "krb5");
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2008-0181.NASL
    descriptionUpdated krb5 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 2.1 and 3. This update has been rated as having critical security impact by the Red Hat Security Response Team. Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. A flaw was found in the way the MIT Kerberos Authentication Service and Key Distribution Center server (krb5kdc) handled Kerberos v4 protocol packets. An unauthenticated remote attacker could use this flaw to crash the krb5kdc daemon, disclose portions of its memory, or possibly execute arbitrary code using malformed or truncated Kerberos v4 protocol requests. (CVE-2008-0062, CVE-2008-0063) This issue only affected krb5kdc with Kerberos v4 protocol compatibility enabled, which is the default setting on Red Hat Enterprise Linux 4. Kerberos v4 protocol support can be disabled by adding
    last seen2020-06-01
    modified2020-06-02
    plugin id31609
    published2008-03-19
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/31609
    titleCentOS 3 : krb5 (CESA-2008:0181)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2008:0181 and 
    # CentOS Errata and Security Advisory 2008:0181 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(31609);
      script_version("1.18");
      script_cvs_date("Date: 2019/10/25 13:36:04");
    
      script_cve_id("CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0947", "CVE-2008-0948");
      script_bugtraq_id(28302, 28303);
      script_xref(name:"RHSA", value:"2008:0181");
    
      script_name(english:"CentOS 3 : krb5 (CESA-2008:0181)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated krb5 packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 2.1 and 3.
    
    This update has been rated as having critical security impact by the
    Red Hat Security Response Team.
    
    Kerberos is a network authentication system which allows clients and
    servers to authenticate to each other through use of symmetric
    encryption and a trusted third party, the KDC.
    
    A flaw was found in the way the MIT Kerberos Authentication Service
    and Key Distribution Center server (krb5kdc) handled Kerberos v4
    protocol packets. An unauthenticated remote attacker could use this
    flaw to crash the krb5kdc daemon, disclose portions of its memory, or
    possibly execute arbitrary code using malformed or truncated Kerberos
    v4 protocol requests. (CVE-2008-0062, CVE-2008-0063)
    
    This issue only affected krb5kdc with Kerberos v4 protocol
    compatibility enabled, which is the default setting on Red Hat
    Enterprise Linux 4. Kerberos v4 protocol support can be disabled by
    adding 'v4_mode=none' (without the quotes) to the '[kdcdefaults]'
    section of /var/kerberos/krb5kdc/kdc.conf.
    
    A flaw was found in the RPC library used by the MIT Kerberos kadmind
    server. An unauthenticated remote attacker could use this flaw to
    crash kadmind. This issue only affected systems with certain resource
    limits configured and did not affect systems using default resource
    limits used by Red Hat Enterprise Linux 2.1 or 3. (CVE-2008-0948)
    
    Red Hat would like to thank MIT for reporting these issues.
    
    All krb5 users are advised to update to these erratum packages which
    contain backported fixes to correct these issues."
      );
      # https://lists.centos.org/pipermail/centos-announce/2008-March/014754.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?fc3f05c1"
      );
      # https://lists.centos.org/pipermail/centos-announce/2008-March/014755.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?40b41450"
      );
      # https://lists.centos.org/pipermail/centos-announce/2008-March/014773.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?f0960a9c"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected krb5 packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:krb5-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:krb5-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:krb5-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:krb5-workstation");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2008/03/18");
      script_set_attribute(attribute:"patch_publication_date", value:"2008/03/18");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/03/19");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 3.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-3", cpu:"i386", reference:"krb5-devel-1.2.7-68")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"ia64", reference:"krb5-devel-1.2.7-68.c3")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"x86_64", reference:"krb5-devel-1.2.7-68")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"i386", reference:"krb5-libs-1.2.7-68")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"ia64", reference:"krb5-libs-1.2.7-68.c3")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"x86_64", reference:"krb5-libs-1.2.7-68")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"i386", reference:"krb5-server-1.2.7-68")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"ia64", reference:"krb5-server-1.2.7-68.c3")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"x86_64", reference:"krb5-server-1.2.7-68")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"i386", reference:"krb5-workstation-1.2.7-68")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"ia64", reference:"krb5-workstation-1.2.7-68.c3")) flag++;
    if (rpm_check(release:"CentOS-3", cpu:"x86_64", reference:"krb5-workstation-1.2.7-68")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "krb5-devel / krb5-libs / krb5-server / krb5-workstation");
    }
    
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2008-0009.NASL
    descriptiona. VMware Tools Local Privilege Escalation on Windows-based guest OS The VMware Tools Package provides support required for shared folders (HGFS) and other features. An input validation error is present in the Windows-based VMware HGFS.sys driver. Exploitation of this flaw might result in arbitrary code execution on the guest system by an unprivileged guest user. It doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id40378
    published2009-07-27
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40378
    titleVMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from VMware Security Advisory 2008-0009. 
    # The text itself is copyright (C) VMware Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(40378);
      script_version("1.26");
      script_cvs_date("Date: 2018/08/06 14:03:16");
    
      script_cve_id("CVE-2006-1721", "CVE-2007-4772", "CVE-2007-5137", "CVE-2007-5378", "CVE-2007-5671", "CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0553", "CVE-2008-0888", "CVE-2008-0948", "CVE-2008-0967", "CVE-2008-2097", "CVE-2008-2100");
      script_bugtraq_id(27163, 27655, 28288, 28302, 28303, 29557);
      script_xref(name:"VMSA", value:"2008-0009");
    
      script_name(english:"VMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues");
      script_summary(english:"Checks esxupdate output for the patches");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote VMware ESXi / ESX host is missing one or more
    security-related patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "a. VMware Tools Local Privilege Escalation on Windows-based guest OS
    
       The VMware Tools Package provides support required for shared folders
       (HGFS) and other features.
    
       An input validation error is present in the Windows-based VMware
       HGFS.sys driver.   Exploitation of this flaw might result in
       arbitrary code execution on the guest system by an unprivileged
       guest user.  It doesn't matter on what host the Windows guest OS
       is running, as this is a guest driver vulnerability and not a
       vulnerability on the host.
    
       The HGFS.sys driver is present in the guest operating system if the
       VMware Tools package is loaded.  Even if the host has HGFS disabled
       and has no shared folders, Windows-based guests may be affected. This
       is regardless if a host supports HGFS.
    
       This issue could be mitigated by removing the VMware Tools package
       from Windows based guests.  However this is not recommended as it
       would impact usability of the product.
    
       NOTE: Installing the new hosted release or ESX patches will not
             remediate the issue.  The VMware Tools packages will need
             to be updated on each Windows-based guest followed by a
             reboot of the guest system.
    
       VMware would like to thank iDefense and Stephen Fewer of Harmony
       Security for reporting this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2007-5671 to this issue.
    
    b. Privilege escalation on ESX or Linux based hosted operating systems
    
       This update fixes a security issue related to local exploitation of
       an untrusted library path vulnerability in vmware-authd. In order to
       exploit this vulnerability, an attacker must have local access and
       the ability to execute the set-uid vmware-authd binary on an affected
       system. Exploitation of this flaw might result in arbitrary code
       execution on the Linux host system by an unprivileged user.
    
       VMware would like to thank iDefense for reporting this issue to us.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0967 to this issue.
    
    c. Openwsman Invalid Content-Length Vulnerability
    
       Openwsman is a system management platform that implements the Web
       Services Management protocol (WS-Management). It is installed and
       running by default. It is used in the VMware Management Service
       Console and in ESXi.
    
       The openwsman management service on ESX 3.5 and ESXi 3.5 is vulnerable
       to a privilege escalation vulnerability, which may allow users with
       non-privileged ESX or Virtual Center accounts to gain root privileges.
    
       To exploit this vulnerability, an attacker would need a local ESX
       account or a VirtualCenter account with the Host.Cim.CimInteraction
       permission.
    
       Systems with no local ESX accounts and no VirtualCenter accounts with
       the Host.Cim.CimInteraction permission are not vulnerable.
    
       This vulnerability cannot be exploited by users without valid login
       credentials.
    
       Discovery: Alexander Sotirov, VMware Security Research
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-2097 to this issue.
    
    d. VMware VIX Application Programming Interface (API) Memory Overflow
       Vulnerabilities
    
       The VIX API (also known as 'Vix') is an API that lets users write scripts
       and programs to manipulate virtual machines.
    
       Multiple buffer overflow vulnerabilities are present in the VIX API.
       Exploitation of these vulnerabilities might result in a privilege
       escalation on the host system. This exploit scenario is relevant for all
       affected products. On VC, ESX30x, and ESX35, users need to have the VM
       Interaction Privilege in order to exploit the vulnerability.
    
       Exploitation of these vulnerabilities might also result in code execution on
       the host system from the guest system or on the service console in ESX Server
       from the guest operating system. This exploit scenario is relevant for
       Workstation 6.0.x (version 6.0.3 and below), Player 2.0.x (version 2.0.3 and
       below), ACE 2.0.x (version 2.0.3 and below), Server 1.0.x (version 1.0.5 and
       below), and ESX3.5. The parameter 'vix.inGuest.enable' in the VMware
       configuration file must be set to true to allow for exploitation on these
       products. Note that the parameter 'vix-inGuest.enable' is set to false by
       default.
    
       The parameter 'vix.inGuest.enable' is present in the
       following products :
    
         VMware Workstation 6.0.2 and higher
         VMware ACE 6.0.2 and higher
         VMware Server 1.06 and higher
         VMware Fusion 1.1.2 and higher
         ESX Server 3.0 and higher
         ESX Server 3.5 and higher
    
       In previous versions of VMware products where the VIX API was introduced,
       the VIX API couldn't be disabled.
    
       This vulnerability is present in ESX and the hosted products even if you
       have not installed the VIX API. To patch your system you will need to
       update to the new hosted product version or to apply the appropriate ESX
       patch. It is not necessary to update the VIX API if you have installed
       the VIX API.
    
       VMware would like to thank Andrew Honig of the Department of
       Defense for reporting this issue.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-2100 to this issue.
    
    II Service Console rpm updates
    
     NOTE: ESXi and hosted products are not affected by any service console
           security updates
    
     a. Security update for cyrus-sasl
    
       Updated cyrus-sasl package for the ESX Service Console corrects a security
       issue found in the DIGEST-MD5 authentication mechanism of Cyrus'
       implementation of Simple Authentication and Security Layer (SASL). As a
       result of this issue in the authentication mechanism, a remote
       unauthenticated attacker might be able to cause a denial of service error
       on the service console.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2006-1721 to this issue.
    
     b. Security update for tcltk
    
       An input validation flaw was discovered in Tk's GIF image handling. A
       code-size value read from a GIF image was not properly validated before
       being used, leading to a buffer overflow. A specially crafted GIF file
       could use this to cause a crash or, potentially, execute code with the
       privileges of the application using the Tk graphical toolkit.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2008-0553 to this issue.
    
       A buffer overflow flaw was discovered in Tk's animated GIF image handling.
       An animated GIF containing an initial image smaller than subsequent images
       could cause a crash or, potentially, execute code with the privileges of
       the application using the Tk library.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2007-5378 to this issue.
    
       A flaw first discovered in the Tcl regular expression engine used in the
       PostgreSQL database server, resulted in an infinite loop when processing
       certain regular expressions.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2007-4772 to this issue.
    
     c. Security update for unzip
    
       This patch includes a moderate security update to the service console that
       fixes a flaw in unzip. An attacker could execute malicious code with a
       user's privileges if the user ran unzip on a file designed to leverage
       this flaw.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2008-0888 to this issue.
    
     d. Security update for krb5
    
       KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable
       for some krb4 message types, which allows remote attackers to
       cause a denial of service (crash) and possibly execute arbitrary
       code via crafted messages that trigger a NULL pointer dereference
       or double-free.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0062 to this issue.
    
       NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
             to this issue.
    
       The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not
       properly clear the unused portion of a buffer when generating an
       error message, which might allow remote attackers to obtain
       sensitive information, aka 'Uninitialized stack values.'
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0063 to this issue.
    
       NOTE: ESX doesn't contain the krb5kdc binary and is not vulnerable
             to this issue.
    
       Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used
       by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably
       other versions before 1.3, when running on systems whose unistd.h
       does not define the FD_SETSIZE macro, allows remote attackers to cause
       a denial of service (crash) and possibly execute arbitrary code by
       triggering a large number of open file descriptors.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2008-0948 to this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://lists.vmware.com/pipermail/security-announce/2008/000022.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply the missing patches.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 119, 189, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:2.5.4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:2.5.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.0.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.0.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:3.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi:3.5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/06/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2009/07/27");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/04/07");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");
      script_family(english:"VMware ESX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/VMware/release", "Host/VMware/version");
      script_require_ports("Host/VMware/esxupdate", "Host/VMware/esxcli_software_vibs");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("vmware_esx_packages.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/VMware/release")) audit(AUDIT_OS_NOT, "VMware ESX / ESXi");
    if (
      !get_kb_item("Host/VMware/esxcli_software_vibs") &&
      !get_kb_item("Host/VMware/esxupdate")
    ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    init_esx_check(date:"2008-06-04");
    flag = 0;
    
    
    if (esx_check(ver:"ESX 2.5.4", patch:"19")) flag++;
    
    if (esx_check(ver:"ESX 2.5.5", patch:"8")) flag++;
    
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004186")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004189")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004190")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004721")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004723")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004725")) flag++;
    if (esx_check(ver:"ESX 3.0.1", patch:"ESX-1004728")) flag++;
    
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004216")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004219")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004719")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004722")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004724")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004726")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004727")) flag++;
    if (esx_check(ver:"ESX 3.0.2", patch:"ESX-1004821")) flag++;
    
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805504-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805505-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805506-SG",
        patch_updates : make_list("ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805507-SG",
        patch_updates : make_list("ESX350-201006408-SG", "ESX350-201008411-SG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805508-SG",
        patch_updates : make_list("ESX350-200911210-UG", "ESX350-200912406-BG", "ESX350-201006409-BG", "ESX350-201105403-BG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 3.5.0",
        patch         : "ESX350-200805515-SG",
        patch_updates : make_list("ESX350-200911201-UG", "ESX350-201006401-SG", "ESX350-201203401-SG", "ESX350-Update02", "ESX350-Update03", "ESX350-Update04", "ESX350-Update05", "ESX350-Update05a")
      )
    ) flag++;
    
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805501-I-SG")) flag++;
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805502-T-SG")) flag++;
    if (esx_check(ver:"ESXi 3.5.0", patch:"ESXe350-200805503-C-SG")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:esx_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20080318_KRB5_ON_SL3_X.NASL
    descriptionA flaw was found in the way the MIT Kerberos Authentication Service and Key Distribution Center server (krb5kdc) handled Kerberos v4 protocol packets. An unauthenticated remote attacker could use this flaw to crash the krb5kdc daemon, disclose portions of its memory, or possibly execute arbitrary code using malformed or truncated Kerberos v4 protocol requests. (CVE-2008-0062, CVE-2008-0063) This issue only affected krb5kdc with Kerberos v4 protocol compatibility enabled, which is the default setting on Scientific Linux 4. Kerberos v4 protocol support can be disabled by adding
    last seen2020-06-01
    modified2020-06-02
    plugin id60373
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60373
    titleScientific Linux Security Update : krb5 on SL3.x, SL4.x, SL5.x i386/x86_64
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(60373);
      script_version("1.7");
      script_cvs_date("Date: 2019/10/25 13:36:17");
    
      script_cve_id("CVE-2007-5901", "CVE-2007-5971", "CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0947", "CVE-2008-0948");
    
      script_name(english:"Scientific Linux Security Update : krb5 on SL3.x, SL4.x, SL5.x i386/x86_64");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A flaw was found in the way the MIT Kerberos Authentication Service
    and Key Distribution Center server (krb5kdc) handled Kerberos v4
    protocol packets. An unauthenticated remote attacker could use this
    flaw to crash the krb5kdc daemon, disclose portions of its memory, or
    possibly execute arbitrary code using malformed or truncated Kerberos
    v4 protocol requests. (CVE-2008-0062, CVE-2008-0063)
    
    This issue only affected krb5kdc with Kerberos v4 protocol
    compatibility enabled, which is the default setting on Scientific
    Linux 4. Kerberos v4 protocol support can be disabled by adding
    'v4_mode=none' (without the quotes) to the '[kdcdefaults]' section of
    /var/kerberos/krb5kdc/kdc.conf.
    
    SL 3x only: A flaw was found in the RPC library used by the MIT
    Kerberos kadmind server. An unauthenticated remote attacker could use
    this flaw to crash kadmind. This issue only affected systems with
    certain resource limits configured and did not affect systems using
    default resource limits used by Scientific Linux 3. (CVE-2008-0948)
    
    SL 4x and 5x only: Multiple memory management flaws were discovered in
    the GSSAPI library used by MIT Kerberos. These flaws could possibly
    result in use of already freed memory or an attempt to free already
    freed memory blocks (double-free flaw), possibly causing a crash or
    arbitrary code execution. (CVE-2007-5901, CVE-2007-5971)
    
    SL 5x only: Jeff Altman of Secure Endpoints discovered a flaw in the
    RPC library as used by MIT Kerberos kadmind server. An unauthenticated
    remote attacker could use this flaw to crash kadmind or possibly
    execute arbitrary code. This issue only affected systems with certain
    resource limits configured and did not affect systems using default
    resource limits used by Red Hat Enterprise Linux 5. (CVE-2008-0947)"
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0803&L=scientific-linux-errata&T=0&P=1691
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?6d795345"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_cwe_id(119, 189, 399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/03/18");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL3", reference:"krb5-devel-1.2.7-68")) flag++;
    if (rpm_check(release:"SL3", reference:"krb5-libs-1.2.7-68")) flag++;
    if (rpm_check(release:"SL3", reference:"krb5-server-1.2.7-68")) flag++;
    if (rpm_check(release:"SL3", reference:"krb5-workstation-1.2.7-68")) flag++;
    
    if (rpm_check(release:"SL4", reference:"krb5-devel-1.3.4-54.el4_6.1")) flag++;
    if (rpm_check(release:"SL4", reference:"krb5-libs-1.3.4-54.el4_6.1")) flag++;
    if (rpm_check(release:"SL4", reference:"krb5-server-1.3.4-54.el4_6.1")) flag++;
    if (rpm_check(release:"SL4", reference:"krb5-workstation-1.3.4-54.el4_6.1")) flag++;
    
    if (rpm_check(release:"SL5", reference:"krb5-devel-1.6.1-17.el5_1.1")) flag++;
    if (rpm_check(release:"SL5", reference:"krb5-libs-1.6.1-17.el5_1.1")) flag++;
    if (rpm_check(release:"SL5", reference:"krb5-server-1.6.1-17.el5_1.1")) flag++;
    if (rpm_check(release:"SL5", reference:"krb5-workstation-1.6.1-17.el5_1.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_KRB5-5082.NASL
    descriptionThis update fixes the following security bugs in krb5/krb5-server : - null/dangling pointer (needs enabled krb4 support). (CVE-2008-0062) - possible operations on uninitialized buffer content/information leak (needs enabled krb4 support). (CVE-2008-0063) - out-of-bound array access in kadmind
    last seen2020-06-01
    modified2020-06-02
    plugin id31624
    published2008-03-19
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/31624
    titleSuSE 10 Security Update : Kerberos 5 (ZYPP Patch Number 5082)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The text description of this plugin is (C) Novell, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(31624);
      script_version ("1.20");
      script_cvs_date("Date: 2019/10/25 13:36:32");
    
      script_cve_id("CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0947", "CVE-2008-0948");
    
      script_name(english:"SuSE 10 Security Update : Kerberos 5 (ZYPP Patch Number 5082)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 10 host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update fixes the following security bugs in krb5/krb5-server :
    
      - null/dangling pointer (needs enabled krb4 support).
        (CVE-2008-0062)
    
      - possible operations on uninitialized buffer
        content/information leak (needs enabled krb4 support).
        (CVE-2008-0063)
    
      - out-of-bound array access in kadmind's RPC lib.
        (CVE-2008-0947 / CVE-2008-0948)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2008-0062.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2008-0063.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2008-0947.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2008-0948.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 5082.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2008/03/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/03/19");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
    if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
    if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");
    
    
    flag = 0;
    if (rpm_check(release:"SLED10", sp:1, reference:"krb5-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLED10", sp:1, reference:"krb5-client-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLED10", sp:1, reference:"krb5-devel-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLED10", sp:1, cpu:"x86_64", reference:"krb5-32bit-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLED10", sp:1, cpu:"x86_64", reference:"krb5-devel-32bit-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"krb5-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"krb5-apps-clients-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"krb5-apps-servers-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"krb5-client-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"krb5-devel-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLES10", sp:1, reference:"krb5-server-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLES10", sp:1, cpu:"x86_64", reference:"krb5-32bit-1.4.3-19.30.6")) flag++;
    if (rpm_check(release:"SLES10", sp:1, cpu:"x86_64", reference:"krb5-devel-32bit-1.4.3-19.30.6")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else exit(0, "The host is not affected.");
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2008-0181.NASL
    descriptionFrom Red Hat Security Advisory 2008:0181 : Updated krb5 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 2.1 and 3. This update has been rated as having critical security impact by the Red Hat Security Response Team. Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. A flaw was found in the way the MIT Kerberos Authentication Service and Key Distribution Center server (krb5kdc) handled Kerberos v4 protocol packets. An unauthenticated remote attacker could use this flaw to crash the krb5kdc daemon, disclose portions of its memory, or possibly execute arbitrary code using malformed or truncated Kerberos v4 protocol requests. (CVE-2008-0062, CVE-2008-0063) This issue only affected krb5kdc with Kerberos v4 protocol compatibility enabled, which is the default setting on Red Hat Enterprise Linux 4. Kerberos v4 protocol support can be disabled by adding
    last seen2020-06-01
    modified2020-06-02
    plugin id67669
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67669
    titleOracle Linux 3 : krb5 (ELSA-2008-0181)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2008:0181 and 
    # Oracle Linux Security Advisory ELSA-2008-0181 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(67669);
      script_version("1.8");
      script_cvs_date("Date: 2019/10/25 13:36:07");
    
      script_cve_id("CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0947", "CVE-2008-0948");
      script_bugtraq_id(28302, 28303);
      script_xref(name:"RHSA", value:"2008:0181");
    
      script_name(english:"Oracle Linux 3 : krb5 (ELSA-2008-0181)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2008:0181 :
    
    Updated krb5 packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 2.1 and 3.
    
    This update has been rated as having critical security impact by the
    Red Hat Security Response Team.
    
    Kerberos is a network authentication system which allows clients and
    servers to authenticate to each other through use of symmetric
    encryption and a trusted third party, the KDC.
    
    A flaw was found in the way the MIT Kerberos Authentication Service
    and Key Distribution Center server (krb5kdc) handled Kerberos v4
    protocol packets. An unauthenticated remote attacker could use this
    flaw to crash the krb5kdc daemon, disclose portions of its memory, or
    possibly execute arbitrary code using malformed or truncated Kerberos
    v4 protocol requests. (CVE-2008-0062, CVE-2008-0063)
    
    This issue only affected krb5kdc with Kerberos v4 protocol
    compatibility enabled, which is the default setting on Red Hat
    Enterprise Linux 4. Kerberos v4 protocol support can be disabled by
    adding 'v4_mode=none' (without the quotes) to the '[kdcdefaults]'
    section of /var/kerberos/krb5kdc/kdc.conf.
    
    A flaw was found in the RPC library used by the MIT Kerberos kadmind
    server. An unauthenticated remote attacker could use this flaw to
    crash kadmind. This issue only affected systems with certain resource
    limits configured and did not affect systems using default resource
    limits used by Red Hat Enterprise Linux 2.1 or 3. (CVE-2008-0948)
    
    Red Hat would like to thank MIT for reporting these issues.
    
    All krb5 users are advised to update to these erratum packages which
    contain backported fixes to correct these issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2008-March/000545.html"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected krb5 packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(119, 189);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:krb5-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:krb5-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:krb5-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:krb5-workstation");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2008/03/18");
      script_set_attribute(attribute:"patch_publication_date", value:"2008/03/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 3", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"krb5-devel-1.2.7-68")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"krb5-devel-1.2.7-68")) flag++;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"krb5-libs-1.2.7-68")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"krb5-libs-1.2.7-68")) flag++;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"krb5-server-1.2.7-68")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"krb5-server-1.2.7-68")) flag++;
    if (rpm_check(release:"EL3", cpu:"i386", reference:"krb5-workstation-1.2.7-68")) flag++;
    if (rpm_check(release:"EL3", cpu:"x86_64", reference:"krb5-workstation-1.2.7-68")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "krb5-devel / krb5-libs / krb5-server / krb5-workstation");
    }
    

Oval

accepted2013-04-29T04:18:30.425-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
    ovaloval:org.mitre.oval:def:11782
  • commentCentOS Linux 3.x
    ovaloval:org.mitre.oval:def:16651
descriptionBuffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.
familyunix
idoval:org.mitre.oval:def:9209
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleBuffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.
version27

Redhat

advisories
rhsa
idRHSA-2008:0181
rpms
  • krb5-debuginfo-0:1.2.7-68
  • krb5-devel-0:1.2.2-48
  • krb5-devel-0:1.2.7-68
  • krb5-libs-0:1.2.2-48
  • krb5-libs-0:1.2.7-68
  • krb5-server-0:1.2.2-48
  • krb5-server-0:1.2.7-68
  • krb5-workstation-0:1.2.2-48
  • krb5-workstation-0:1.2.7-68