[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3206-1] heimdal security update

Debian LTS Advisory DLA-3206-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                       Guilhem Moulin
November 26, 2022                             https://wiki.debian.org/LTS

Package        : heimdal
Version        : 7.5.0+dfsg-3+deb10u1
CVE ID         : CVE-2019-14870 CVE-2021-3671 CVE-2021-44758 CVE-2022-3437
                 CVE-2022-41916 CVE-2022-42898 CVE-2022-44640
Debian Bug     : 946786 996586 1024187

Multiple security vulnerabilities were discovered in heimdal, an
implementation of the Kerberos 5 authentication protocol, which may
result in denial of service, information disclosure, or remote code


    Isaac Boukris reported that the Heimdal KDC before 7.7.1 does not
    apply delegation_not_allowed (aka not-delegated) user attributes for
    S4U2Self.  Instead the forwardable flag is set even if the
    impersonated client has the not-delegated flag set.


    Joseph Sutton discovered that the Heimdal KDC before 7.7.1 does not
    check for missing missing sname in TGS-REQ (Ticket Granting Server -
    Request) before before dereferencing.  An authenticated user could
    use this flaw to crash the KDC.


    It was discovered that Heimdal is prone to a NULL dereference in
    acceptors when the initial SPNEGO token has no acceptable
    mechanisms, which may result in denial of service for a server
    application that uses the Simple and Protected GSSAPI Negotiation
    Mechanism (SPNEGO).


    Evgeny Legerov reported that the DES and Triple-DES decryption
    routines in the Heimdal GSSAPI library before 7.7.1 were prone to
    buffer overflow on malloc() allocated memory when presented with a
    maliciously small packet.  In addition, the Triple-DES and RC4
    (arcfour) decryption routine were prone to non-constant time leaks,
    which could potentially yield to a leak of secret key material when
    using these ciphers.


    It was discovered that Heimdal's PKI certificate validation library
    before 7.7.1 can under some circumstances perform an out-of-bounds
    memory access when normalizing Unicode, which may result in denial
    of service.


    Greg Hudson discovered an integer multiplication overflow in the
    Privilege Attribute Certificate (PAC) parsing routine, which may
    result in denial of service for Heimdal KDCs and possibly Heimdal
    servers (e.g., via GSS-API) on 32-bit systems.


    Douglas Bagnall and the Heimdal maintainers independently discovered
    that Heimdal's ASN.1 compiler before 7.7.1 generates code that
    allows specially crafted DER encodings of CHOICEs to invoke the
    wrong free() function on the decoded structure upon decode error,
    which may result in remote code execution in the Heimdal KDC and
    possibly the Kerberos client, the X.509 library, and other
    components as well.

For Debian 10 buster, these problems have been fixed in version

We recommend that you upgrade your heimdal packages.

For the detailed security status of heimdal please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature

Reply to: