]> git.ipfire.org Git - thirdparty/krb5.git/commit
Prevent requires_preauth bypass [CVE-2015-2694]
authorGreg Hudson <ghudson@mit.edu>
Tue, 24 Mar 2015 16:02:37 +0000 (12:02 -0400)
committerTom Yu <tlyu@mit.edu>
Thu, 14 May 2015 00:05:48 +0000 (20:05 -0400)
commitb0c571e709c72da799ccc15fb5755f7910170e33
tree41f3ccc5410b6786be5c06bbf9b380dcfca0a4e9
parent3d56ca44fc331bc6dfd0ee114b7f185d0ac55a2a
Prevent requires_preauth bypass [CVE-2015-2694]

In the OTP kdcpreauth module, don't set the TKT_FLG_PRE_AUTH bit until
the request is successfully verified.  In the PKINIT kdcpreauth
module, don't respond with code 0 on empty input or an unconfigured
realm.  Together these bugs could cause the KDC preauth framework to
erroneously treat a request as pre-authenticated.

CVE-2015-2694:

In MIT krb5 1.12 and later, when the KDC is configured with PKINIT
support, an unauthenticated remote attacker can bypass the
requires_preauth flag on a client principal and obtain a ciphertext
encrypted in the principal's long-term key.  This ciphertext could be
used to conduct an off-line dictionary attack against the user's
password.

    CVSSv2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:POC/RL:OF/RC:C

(cherry picked from commit e3b5a5e5267818c97750b266df50b6a3d4649604)
(cherry picked from commit df8afc60d970a7176a55ffe7ce21cfd57ba423cd)

ticket: 8194 (new)
version_fixed: 1.12.4
status: resolved
src/plugins/preauth/otp/main.c
src/plugins/preauth/pkinit/pkinit_srv.c