Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5849-1

Ubuntu Security Notice 5849-1 - Helmut Grohne discovered that Heimdal GSSAPI incorrectly handled logical conditions that are related to memory management operations. An attacker could possibly use this issue to cause a denial of service.

Packet Storm
#vulnerability#ubuntu#dos#git#auth#sap

==========================================================================
Ubuntu Security Notice USN-5849-1
February 08, 2023

heimdal vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Summary:

Heimdal could be made to crash if it received specially crafted
input.

Software Description:

  • heimdal: Heimdal Kerberos Network Authentication Protocol

Details:

Helmut Grohne discovered that Heimdal GSSAPI incorrectly handled logical
conditions that are related to memory management operations.
An attacker could possibly use this issue to cause a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
libgssapi3-heimdal 7.7.0+dfsg-1ubuntu1.4

Ubuntu 18.04 LTS:
libgssapi3-heimdal 7.5.0+dfsg-1ubuntu0.4

Ubuntu 16.04 ESM:
libgssapi3-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm4

Ubuntu 14.04 ESM:
libgssapi3-heimdal 1.6~git20131207+dfsg-1ubuntu1.2+esm4

After a standard system update you need to restart any application
using Heimdal libraries to make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5849-1
CVE-2022-45142

Package Information:
https://launchpad.net/ubuntu/+source/heimdal/7.7.0+dfsg-1ubuntu1.4
https://launchpad.net/ubuntu/+source/heimdal/7.5.0+dfsg-1ubuntu0.4

Related news

Gentoo Linux Security Advisory 202310-06

Gentoo Linux Security Advisory 202310-6 - Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC. Versions greater than or equal to 7.8.0-r1 are affected.

CVE-2022-45142: security - [vs] heimdal: CVE-2022-45142: signature validation failure

The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.

Debian Security Advisory 5344-1

Debian Linux Security Advisory 5344-1 - Helmut Grohne discovered a flaw in Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos. The backports of fixes for CVE-2022-3437 accidentally inverted important memory comparisons in the arcfour-hmac-md5 and rc4-hmac integrity check handlers for gssapi, resulting in incorrect validation of message integrity codes.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution