Bug 10090 - krb5 - UDP ping-pong flaw in kpasswd (CVE-2002-2443)
Summary: krb5 - UDP ping-pong flaw in kpasswd (CVE-2002-2443)
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 3
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/551277/
Whiteboard: MGA2TOO MGA2-64-OK MGA2-32-OK MGA3-64...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2013-05-14 09:24 CEST by Oden Eriksson
Modified: 2014-05-08 18:06 CEST (History)
4 users (show)

See Also:
Source RPM: krb5
CVE:
Status comment:


Attachments
krb5_server_setup.sh modified to work on Mageia 2 or 3. (2.87 KB, text/plain)
2013-05-27 01:55 CEST, Dave Hodgins
Details
krb5_server_setup.sh modified to also fix changed location of kadm5.keytab (2.95 KB, text/plain)
2013-05-27 02:33 CEST, Dave Hodgins
Details

Description Oden Eriksson 2013-05-14 09:24:39 CEST
https://bugzilla.redhat.com/show_bug.cgi?id=962531

" Vincent Danen 2013-05-13 15:17:25 EDT

A flaw in certain programs that handle UDP traffic was discovered and assigned the name CVE-1999-0103 (that CVE specifically mentions echo and chargen as vulnerable).  In 2002, a Nessus plugin was included [1] that reference this CVE name, but was for the kpasswd service.  Until recently, this issue had not been reported upstream.  This issue has since been reported upstream [2] and is now fixed [3].

If a malicious remote user were to spoof their IP address to that of another server running kadmind with the password change port (kpasswd, port 464), or to the target server's IP address itself), kpasswd will pass UDP packets to the spoofed address and reply each time.  This can be used to consume bandwidth and CPU on the affected servers running kadmind.

This should be fixed in the for krb5-1.11.3 release.

[1] http://marc.info/?l=nessus&m=102418951803893&w=2
[2] http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637
[3] https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c"
Comment 1 Oden Eriksson 2013-05-14 09:49:57 CEST
krb5-1.9.2-2.6.mga2 has been submitted.

fix for krb5 in cauldron has been committed.
Comment 2 David Walser 2013-05-14 15:46:50 CEST
Wow, only took 11 years to be reported upstream.

We'll have to wait until after the Mageia 3 release to fix this now.

CC: (none) => luigiwalser
Version: 2 => Cauldron
Whiteboard: (none) => MGA3TOO, MGA2TOO

Comment 3 David Walser 2013-05-14 16:13:33 CEST
The Cauldron one is in updates_testing, so once Mageia 3 is branched it'll just need to be resubmitted to the build system.
Comment 4 David Walser 2013-05-21 18:45:44 CEST
Mandriva has issued an advisory for this today (May 21):
http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2013:166/

Summary: CVE-2002-2443: krb5 - UDP ping-pong flaw in kpasswd => krb5 - UDP ping-pong flaw in kpasswd (CVE-2002-2443)

David Walser 2013-05-21 19:05:03 CEST

URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443 => http://lwn.net/Vulnerabilities/551277/

Comment 5 David Walser 2013-05-24 18:50:55 CEST
Patched packages uploaded for Mageia 2, Mageia 3, and Cauldron.

Advisory:
========================

Updated krb5 packages fix security vulnerability:

The kpasswd service provided by kadmind was vulnerable to a UDP
ping-pong attack (CVE-2002-2443).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
https://bugzilla.redhat.com/show_bug.cgi?id=962531
http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2013:166/
========================

Updated packages in core/updates_testing:
========================
krb5-1.9.2-2.6.mga2
libkrb53-1.9.2-2.6.mga2
libkrb53-devel-1.9.2-2.6.mga2
krb5-server-1.9.2-2.6.mga2
krb5-server-ldap-1.9.2-2.6.mga2
krb5-workstation-1.9.2-2.6.mga2
krb5-pkinit-openssl-1.9.2-2.6.mga2
krb5-1.11.1-1.1.mga3
libkrb53-devel-1.11.1-1.1.mga3
libkrb53-1.11.1-1.1.mga3
krb5-server-1.11.1-1.1.mga3
krb5-server-ldap-1.11.1-1.1.mga3
krb5-workstation-1.11.1-1.1.mga3
krb5-pkinit-openssl-1.11.1-1.1.mga3

from Source RPMs:
krb5-1.9.2-2.6.mga2.src.rpm
krb5-1.11.1-1.1.mga3.src.rpm

Version: Cauldron => 3
Assignee: bugsquad => qa-bugs
Whiteboard: MGA3TOO, MGA2TOO => MGA2TOO
Severity: normal => major

Comment 6 Dave Hodgins 2013-05-26 18:42:03 CEST
No poc that I've found, so just testing as per
https://wiki.mageia.org/en/QA_procedure:Krb5

Testing shortly.

CC: (none) => davidwhodgins

Comment 7 Dave Hodgins 2013-05-26 20:47:08 CEST
Testing complete on Mageia 2 i586 and x86_64.

There have been enough changes in Mageia 3, so that the qa krb5 setup
script isn't working.  Once I've figured out what's changed, and
updated the script to handle it, I'll test on Mageia 3.

Whiteboard: MGA2TOO => MGA2TOO MGA2-64-OK MGA2-32-OK

Comment 8 Dave Hodgins 2013-05-27 01:54:49 CEST
Before and after installing the update, on Mageia 3, kadmind is failing to
start, with /var/log/kadmind.log showing
May 26 19:49:18 i3v.hodgins.homeip.net kadmind[1201](Error): kadmind: could not initialize loop, aborting

The krb5kdc also fails to start. krb5kdc.log has 
krb5kdc: Cannot allocate memory - while creating main loop

Whiteboard: MGA2TOO MGA2-64-OK MGA2-32-OK => MGA2TOO MGA2-64-OK MGA2-32-OK feedback

Comment 9 Dave Hodgins 2013-05-27 01:55:49 CEST
Created attachment 4056 [details]
krb5_server_setup.sh modified to work on Mageia 2 or 3.
David Walser 2013-05-27 02:23:53 CEST

CC: (none) => guillomovitch

Comment 10 Dave Hodgins 2013-05-27 02:33:43 CEST
Created attachment 4057 [details]
krb5_server_setup.sh modified to also fix changed location of kadm5.keytab

Attachment 4056 is obsolete: 0 => 1

Comment 11 Dave Hodgins 2013-05-27 02:55:11 CEST
For the memory problem in krb5kdc, found
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652699

After installing libverto-libev, I can start both the krb5kd service and
the kadmin services.

Do you want to hold this update until the requires is added, or should
I open a separate bug report, and validate this one, when I'm finished
testing?
Comment 12 David Walser 2013-05-27 03:03:27 CEST
This actually sounds like something that should be fixed.

Normally library requires are picked up automatically, but it could be that it dlopen()'s this library, in which case it wouldn't be.  I see that libverto-libev provides a "libverto-module-base," but so do a couple other libverto subpackages.  I don't know if krb5 can use any of them or if it needs a specific one (%{lib}vert-libev in this case).  Guillaume, do you know which requires we should add here?
Comment 13 Dave Hodgins 2013-05-27 03:38:16 CEST
I've finished testing, with the libverto-libev package installed, and am
prepared to validate this bug report with bug 10307 opened for the missing
requires, but I'll hold off till a decision is made.
Comment 14 Guillaume Rousse 2013-05-29 00:08:15 CEST
According to my understanding, and fedora package, any liberto backend should work, so just requiring "libverto-module-base" should be enough.
Comment 15 David Walser 2013-05-29 01:16:00 CEST
Thanks Dave and Guillaume.

Fixed packages uploaded for Mageia 3 and Cauldron.


Advisory:
========================

Updated krb5 packages fix security vulnerability:

The kpasswd service provided by kadmind was vulnerable to a UDP
ping-pong attack (CVE-2002-2443).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
https://bugzilla.redhat.com/show_bug.cgi?id=962531
http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2013:166/
========================

Updated packages in core/updates_testing:
========================
krb5-1.9.2-2.6.mga2
libkrb53-1.9.2-2.6.mga2
libkrb53-devel-1.9.2-2.6.mga2
krb5-server-1.9.2-2.6.mga2
krb5-server-ldap-1.9.2-2.6.mga2
krb5-workstation-1.9.2-2.6.mga2
krb5-pkinit-openssl-1.9.2-2.6.mga2
krb5-1.11.1-1.2.mga3
libkrb53-devel-1.11.1-1.2.mga3
libkrb53-1.11.1-1.2.mga3
krb5-server-1.11.1-1.2.mga3
krb5-server-ldap-1.11.1-1.2.mga3
krb5-workstation-1.11.1-1.2.mga3
krb5-pkinit-openssl-1.11.1-1.2.mga3

from Source RPMs:
krb5-1.9.2-2.6.mga2.src.rpm
krb5-1.11.1-1.2.mga3.src.rpm

Whiteboard: MGA2TOO MGA2-64-OK MGA2-32-OK feedback => MGA2TOO MGA2-64-OK MGA2-32-OK

Comment 16 Dave Hodgins 2013-05-31 05:28:50 CEST
Testing complete on Mageia 3 i586 and x86_64, and updates made to testing procedure
https://wiki.mageia.org/en/QA_procedure:Krb5

Could someone from the sysadmin team push the srpm
krb5-1.11.1-1.2.mga3.src.rpm
from Mageia 3 Core Updates Testing to Core Updates, and the srpm
krb5-1.9.2-2.6.mga2.src.rpm
from Mageia 2 Core Updates Testing to Core Updates.

Advisory: Updated krb5 packages fix security vulnerability:

The kpasswd service provided by kadmind was vulnerable to a UDP
ping-pong attack (CVE-2002-2443).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
https://bugzilla.redhat.com/show_bug.cgi?id=962531
http://www.mandriva.com/en/support/security/advisories/mbs1/MDVSA-2013:166/

https://bugs.mageia.org/show_bug.cgi?id=10090

Keywords: (none) => validated_update
Whiteboard: MGA2TOO MGA2-64-OK MGA2-32-OK => MGA2TOO MGA2-64-OK MGA2-32-OK MGA3-64-OK MGA3-32-OK
CC: (none) => sysadmin-bugs

Comment 17 Nicolas Vigier 2013-06-06 21:41:10 CEST
Update has been pushed.

Status: NEW => RESOLVED
CC: (none) => boklm
Resolution: (none) => FIXED

Nicolas Vigier 2014-05-08 18:06:39 CEST

CC: boklm => (none)


Note You need to log in before you can comment on or make changes to this bug.