Bug 1065274 (CVE-2017-15088)

Summary: VUL-0: CVE-2017-15088: krb5: Buffer overflow in get_matching_data()
Product: [Novell Products] SUSE Security Incidents Reporter: Alexander Bergmann <abergmann>
Component: IncidentsAssignee: Chris Kowalczyk <ckowalczyk>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: abergmann, meissner, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/194104/
Whiteboard: CVSSv3:RedHat:CVE-2017-15088:7.1:(AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) CVSSv2:NVD:CVE-2017-15088:7.5:(AV:N/AC:L/Au:N/C:P/I:P/A:P) CVSSv2:SUSE:CVE-2017-15088:7.1:(AV:N/AC:H/Au:S/C:C/I:C/A:C) CVSSv3:SUSE:CVE-2017-15088:7.5:(AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Alexander Bergmann 2017-10-26 14:22:10 UTC
rh#1504045

A buffer overflow vulnerability was found in get_matching_data() function when both the CA cert and the user cert have a long subject affecting krb5 that includes certauth plugin. Attack requires a validated certificate with a long subject and issuer, and a "pkinit_cert_match" string attribute on some principal in the database. A remote code execution exploit might also require that the attacker gets to choose the contents of the issuer in the validated cert.

Bug report:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
Comment 2 Howard Guo 2017-10-30 15:25:15 UTC
Apart from Teradata's version, SLES 11 is not affected due to its lack of PKINIT infrastructure.
Comment 3 Swamp Workflow Management 2017-11-08 11:17:07 UTC
SUSE-SU-2017:2948-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1065274
CVE References: CVE-2017-15088
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Server 12-SP3 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Server 12-SP2 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Desktop 12-SP2 (src):    krb5-1.12.5-40.16.1
SUSE Container as a Service Platform ALL (src):    krb5-1.12.5-40.16.1
OpenStack Cloud Magnum Orchestration 7 (src):    krb5-1.12.5-40.16.1
Comment 4 Swamp Workflow Management 2017-11-10 17:24:05 UTC
openSUSE-SU-2017:2993-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1065274
CVE References: CVE-2017-15088
Sources used:
openSUSE Leap 42.3 (src):    krb5-1.12.5-12.1, krb5-mini-1.12.5-12.1
openSUSE Leap 42.2 (src):    krb5-1.12.5-6.6.1, krb5-mini-1.12.5-6.6.1
Comment 5 Chris Kowalczyk 2018-10-02 11:26:25 UTC
This ticket in my opinion is completed, are you happy with closing this bug, Alexander?
Comment 6 Marcus Meissner 2018-10-02 11:33:15 UTC
done -> closing
Comment 7 Chris Kowalczyk 2018-10-02 11:46:42 UTC
thanks for the quick answer!