aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorStanislav Sedov <stas@FreeBSD.org>2010-12-10 01:02:04 +0000
committerStanislav Sedov <stas@FreeBSD.org>2010-12-10 01:02:04 +0000
commit3f94eeab0792c082103566b2eca9f13347731ea5 (patch)
tree5fb13c70a72df30abb2f6c6b363e83af53c49ae2 /security
parent76e9c0860c4df58fc2d126856741a4315a19ef8a (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml189
1 files changed, 189 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index f54dcaa1f1c2..d9d418dcd930 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,195 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="4ccbd40d-03f7-11e0-bf50-001a926c7637">
+ <topic>krb5 -- client impersonation vulnerability</topic>
+ <affects>
+ <package>
+ <name>krb5</name>
+ <range><ge>1.7.0</ge><lt>1.8.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The MIT Kerberos team reports:</p>
+ <blockquote cite="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt">
+ <p>MIT krb5 KDC may issue tickets not requested
+ by a client, based on an attacker-chosen KrbFastArmoredReq.</p>
+ <p>An authenticated remote attacker that controls a legitimate service
+ principal could obtain a valid service ticket to itself containing
+ valid KDC-generated authorization data for a client whose TGS-REQ it
+ has intercepted. The attacker could then use this ticket for
+ S4U2Proxy to impersonate the targeted client even if the client
+ never authenticated to the subverted service. The vulnerable
+ configuration is believed to be rare.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>45122</bid>
+ <cvename>CVE-2010-4021</cvename>
+ <url>http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt</url>
+ <url>http://osvdb.org/69607</url>
+ </references>
+ <dates>
+ <discovery>2010-11-30</discovery>
+ <entry>2010-12-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1d193bba-03f6-11e0-bf50-001a926c7637">
+ <topic>krb5 -- RFC 3961 key-derivation checksum handling vulnerability</topic>
+ <affects>
+ <package>
+ <name>krb5</name>
+ <range><ge>1.8.0</ge><le>1.8.3</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The MIT Kerberos team reports:</p>
+ <blockquote cite="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt">
+ <p>MIT krb5 (releases incorrectly accepts RFC 3961
+ key-derivation checksums using RC4 keys when verifying AD-SIGNEDPATH
+ and AD-KDC-ISSUED authorization data.</p>
+ <p>An authenticated remote attacker that controls a legitimate service
+ principal has a 1/256 chance of forging the AD-SIGNEDPATH signature
+ if the TGT key is RC4, allowing it to use self-generated "evidence"
+ tickets for S4U2Proxy, instead of tickets obtained from the user or
+ with S4U2Self. Configurations using RC4 for the TGT key are
+ believed to be rare.</p>
+ <p>An authenticated remote attacker has a 1/256 chance of forging
+ AD-KDC-ISSUED signatures on authdata elements in tickets having
+ an RC4 service key, resulting in privilege escalation against
+ a service that relies on these signatures. There are no known
+ uses of the KDC-ISSUED authdata container at this time.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>45117</bid>
+ <cvename>CVE-2010-4020</cvename>
+ <url>http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt</url>
+ <url>http://osvdb.org/69608</url>
+ </references>
+ <dates>
+ <discovery>2010-11-30</discovery>
+ <entry>2010-12-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9f971cea-03f5-11e0-bf50-001a926c7637">
+ <topic>krb5 -- unkeyed PAC checksum handling vulnerability</topic>
+ <affects>
+ <package>
+ <name>krb5</name>
+ <range><ge>1.7.0</ge><lt>1.8.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The MIT Kerberos team reports:</p>
+ <blockquote cite="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt">
+ <p>MIT krb5 incorrectly accepts an unkeyed checksum for PAC
+ signatures.</p>
+ <p>An authenticated remote attacker can forge PACs if using a KDC that
+ does not filter client-provided PAC data. This can result in
+ privilege escalation against a service that relies on PAC contents
+ to make authorization decisions.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>45116</bid>
+ <cvename>CVE-2010-1324</cvename>
+ <url>http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt</url>
+ <url>http://osvdb.org/69609</url>
+ </references>
+ <dates>
+ <discovery>2010-11-30</discovery>
+ <entry>2010-12-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="0d57c1d9-03f4-11e0-bf50-001a926c7637">
+ <topic>krb5 -- multiple checksum handling vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>krb5</name>
+ <range><ge>1.7.0</ge><le>1.8.3</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The MIT Kerberos team reports:</p>
+ <blockquote cite="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt">
+ <p>MIT krb incorrectly accepts an unkeyed
+ checksum with DES session keys for version 2 (RFC 4121)
+ of the GSS-API krb5 mechanism.</p>
+ <p>An unauthenticated remote attacker can forge GSS tokens that are
+ intended to be integrity-protected but unencrypted, if the targeted
+ pre-existing application session uses a DES session key.</p>
+ <p>MIT krb5 KDC incorrectly accepts RFC
+ 3961 key-derivation checksums using RC4 keys when verifying the
+ req-checksum in a KrbFastArmoredReq.</p>
+ <p>An unauthenticated remote attacker has a 1/256 chance of swapping a
+ client-issued KrbFastReq into a different KDC-REQ, if the armor
+ key is RC4. The consequences are believed to be minor.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>45116</bid>
+ <cvename>CVE-2010-1324</cvename>
+ <url>http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt</url>
+ <url>http://osvdb.org/69609</url>
+ </references>
+ <dates>
+ <discovery>2010-11-30</discovery>
+ <entry>2010-12-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="11bbccbc-03ee-11e0-bcdb-001fc61c2a55">
+ <topic>krb5 -- multiple checksum handling vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>krb5</name>
+ <range><ge>1.3.0</ge><le>1.8.3</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The MIT Kerberos team reports:</p>
+ <blockquote cite="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt">
+ <p>MIT krb5 clients incorrectly accept an unkeyed checksums
+ in the SAM-2 preauthentication challenge.</p>
+ <p>An unauthenticated remote attacker could alter a SAM-2 challenge,
+ affecting the prompt text seen by the user or the kind of response
+ sent to the KDC. Under some circumstances, this can negate the
+ incremental security benefit of using a single-use authentication
+ mechanism token.</p>
+ <p>MIT krb5 incorrectly accepts RFC 3961 key-derivation checksums
+ using RC4 keys when verifying KRB-SAFE messages.</p>
+ <p>An unauthenticated remote attacker has a 1/256 chance of forging
+ KRB-SAFE messages in an application protocol if the targeted
+ pre-existing session uses an RC4 session key. Few application
+ protocols use KRB-SAFE messages.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>45118</bid>
+ <cvename>CVE-2010-1323</cvename>
+ <url>http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt</url>
+ <url>http://osvdb.org/69610</url>
+ </references>
+ <dates>
+ <discovery>2010-11-30</discovery>
+ <entry>2010-12-09</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6887828f-0229-11e0-b84d-00262d5ed8ee">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>