{"vuid":"VU#365313","idnumber":"365313","name":"MIT Kerberos kadmind RPC library gssrpc__svcauth_unix() integer conversion error","keywords":["MIT","Kerberos","kadmind","remote code execution","krb5-06262007","apple_2007-007"],"overview":"The MIT Kerberos administration daemon (kadmind) contains an integer conversion error vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service.","clean_desc":"The gssrpc__svcauth_unix() function used by the Kerberos administration daemon contains an integer conversion error. This vulnerability may cause a stack buffer overflow that could allow a remote, authenticated user to execute arbitrary code. According to MIT krb5 Security Advisory MITKRB5-SA-2007-004: The function gssrpc__svcauth_unix() in src/lib/rpc/svc_auth_unix.c stores an unsigned integer obtained from IXDR_GET_U_LONG into a signed integer variable \"str_len\". Subsequently, it checks that \"str_len\" is less than MAX_MACHINE_NAME, which will always be true of \"str_len\" is negative, which can happen when a large unsigned integer is converted to a signed integer. Once the length check succeeds, gssrpc__svcauth_unix() calls memmove() with a length of \"str_len\" with the target in a stack buffer. This vulnerability is believed to be difficult to exploit because the memmove() implementation receives a very large number (a negative integer converted to a large unsigned value), which will almost certainly cause some sort of memory access fault prior to returning. This probably avoids any usage of the corrupted return address in the overwritten stack frame. Note that some (perhaps unlikely) memmove() implementations may call other procedures and thus may be vulnerable to corrupted return addresses. Note that this issue affects all releases of MIT krb5 up to and including krb5-1.6.1. Third-party applications using the MIT krb5 RPC library or other RPC libraries derived from SunRPC may also be vulnerable. MIT has been provided with proof-of-concept exploit code that causes a denial of service, but it's not clear whether the exploit code is publicly available yet. This vulnerability occurred as a result of failing to comply with rule INT31-C of the CERT C Programming Language Secure Coding Standard.","impact":"A remote, unauthenticated user may be able to execute arbitrary code on an affected system or cause the affected program to crash, resulting in a denial of service. Secondary impacts of code execution include complete compromise of the Kerberos key database.","resolution":"Apply a patch\nA patch can be obtained from MIT krb5 Security Advisory MITKRB5-SA-2007-004. MIT also states that this will be addressed in the upcoming krb5-1.6.2 and krb5-1.5.4 releases. Please check with your vendor for third-party product updates.","workarounds":"","sysaffected":"","thanks":"Thanks to MIT for reporting this vulnerability, who in turn credit Wei Wang of McAfee Avert Labs.","author":"This document was written by Will Dormann.","public":["http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt","http://www.ubuntu.com/usn/usn-477-1","http://www.mandriva.com/security/advisories?name=MDKSA-2007:137","http://secunia.com/advisories/25800/","http://secunia.com/advisories/26033/","http://docs.info.apple.com/article.html?artnum=306172"],"cveids":["CVE-2007-2443"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-06-13T21:01:24Z","publicdate":"2007-06-26T00:00:00Z","datefirstpublished":"2007-06-26T18:59:11Z","dateupdated":"2007-08-08T16:52:06Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"16","cam_exploitation":"0","cam_internetinfrastructure":"16","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"3","cam_attackeraccessrequired":"15","cam_scorecurrent":"5.4","cam_scorecurrentwidelyknown":"6.075","cam_scorecurrentwidelyknownexploited":"9.45","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.4,"vulnote":null}