what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5287-1

Debian Security Advisory 5287-1
Posted Nov 23, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5287-1 - Several vulnerabilities were discovered in Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2021-3671, CVE-2021-44758, CVE-2022-3437, CVE-2022-41916, CVE-2022-42898, CVE-2022-44640
SHA-256 | 84acf94eecacae5883c23a1272096230f0b336c4708449aaa72442ec79969d0e

Debian Security Advisory 5287-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5287-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 22, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : heimdal
CVE ID : CVE-2021-3671 CVE-2021-44758 CVE-2022-3437 CVE-2022-41916
CVE-2022-42898 CVE-2022-44640
Debian Bug : 996586

Several vulnerabilities were discovered in Heimdal, an implementation of
Kerberos 5 that aims to be compatible with MIT Kerberos.

CVE-2021-3671

Joseph Sutton discovered that the Heimdal KDC does not validate that
the server name in the TGS-REQ is present before dereferencing,
which may result in denial of service.

CVE-2021-44758

It was discovered that Heimdal is prone to a NULL dereference in
acceptors where an initial SPNEGO token that has no acceptable
mechanisms, which may result in denial of service for a server
application that uses SPNEGO.

CVE-2022-3437

Several buffer overflow flaws and non-constant time leaks were
discovered when using 1DES, 3DES or RC4 (arcfour).

CVE-2022-41916

An out-of-bounds memory access was discovered when Heimdal
normalizes Unicode, which may result in denial of service.

CVE-2022-42898

It was discovered that integer overflows in PAC parsing may result
in denial of service for Heimdal KDCs or possibly Heimdal servers.

CVE-2022-44640

It was discovered that the Heimdal's ASN.1 compiler generates code
that allows specially crafted DER encodings to invoke an invalid
free on the decoded structure upon decode error, which may result in
remote code execution in the Heimdal KDC.

For the stable distribution (bullseye), these problems have been fixed in
version 7.7.0+dfsg-2+deb11u2.

We recommend that you upgrade your heimdal packages.

For the detailed security status of heimdal please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/heimdal

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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ÝFe
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    22 Files
  • 31
    May 31st
    18 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close