First published: Wed Feb 22 2012(Updated: )
It was reported [1] that, within the kadmin protocol, the access controls for get_strings/set_string were insufficient; anyone with global list privileges could get or modify string attributed on any principal. It was also noted that the exposure depends on how generous the kadmind acl was with list permissions and whether or not string attributes were used in deployment (and noting that nothing in the core code uses them yet). This has been fixed upstream [2] and in Fedora [3]. [1] <a href="http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7093">http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7093</a> [2] <a href="http://src.mit.edu/fisheye/changelog/krb5/?cs=25704">http://src.mit.edu/fisheye/changelog/krb5/?cs=25704</a> [3] <a href="http://koji.fedoraproject.org/koji/buildinfo?buildID=300840">http://koji.fedoraproject.org/koji/buildinfo?buildID=300840</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Kerberos |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-796438 is categorized as critical due to insufficient access controls in the kadmin protocol.
To fix REDHAT-BUG-796438, update your MIT Kerberos installation to the latest version that addresses this vulnerability.
Any user of MIT Kerberos with global list privileges may be affected by REDHAT-BUG-796438 based on the configuration of the access control list.
REDHAT-BUG-796438 involves the kadmin protocol and its management of access controls for string attributes.
REDHAT-BUG-796438 can be exploited to allow unauthorized access or modification of string attributes on any principal by users with global list privileges.