Bug 1065274 - (CVE-2017-15088) VUL-0: CVE-2017-15088: krb5: Buffer overflow in get_matching_data()
(CVE-2017-15088)
VUL-0: CVE-2017-15088: krb5: Buffer overflow in get_matching_data()
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: ---
Assigned To: Chris Kowalczyk
Security Team bot
https://smash.suse.de/issue/194104/
CVSSv3:RedHat:CVE-2017-15088:7.1:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2017-10-26 14:22 UTC by Alexander Bergmann
Modified: 2018-10-02 11:46 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2017-10-26 14:22:10 UTC
rh#1504045

A buffer overflow vulnerability was found in get_matching_data() function when both the CA cert and the user cert have a long subject affecting krb5 that includes certauth plugin. Attack requires a validated certificate with a long subject and issuer, and a "pkinit_cert_match" string attribute on some principal in the database. A remote code execution exploit might also require that the attacker gets to choose the contents of the issuer in the validated cert.

Bug report:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
Comment 2 Howard Guo 2017-10-30 15:25:15 UTC
Apart from Teradata's version, SLES 11 is not affected due to its lack of PKINIT infrastructure.
Comment 3 Swamp Workflow Management 2017-11-08 11:17:07 UTC
SUSE-SU-2017:2948-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1065274
CVE References: CVE-2017-15088
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Software Development Kit 12-SP2 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Server 12-SP3 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Server 12-SP2 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    krb5-1.12.5-40.16.1
SUSE Linux Enterprise Desktop 12-SP2 (src):    krb5-1.12.5-40.16.1
SUSE Container as a Service Platform ALL (src):    krb5-1.12.5-40.16.1
OpenStack Cloud Magnum Orchestration 7 (src):    krb5-1.12.5-40.16.1
Comment 4 Swamp Workflow Management 2017-11-10 17:24:05 UTC
openSUSE-SU-2017:2993-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1065274
CVE References: CVE-2017-15088
Sources used:
openSUSE Leap 42.3 (src):    krb5-1.12.5-12.1, krb5-mini-1.12.5-12.1
openSUSE Leap 42.2 (src):    krb5-1.12.5-6.6.1, krb5-mini-1.12.5-6.6.1
Comment 5 Chris Kowalczyk 2018-10-02 11:26:25 UTC
This ticket in my opinion is completed, are you happy with closing this bug, Alexander?
Comment 6 Marcus Meissner 2018-10-02 11:33:15 UTC
done -> closing
Comment 7 Chris Kowalczyk 2018-10-02 11:46:42 UTC
thanks for the quick answer!