Vulnerability Note VU#684563

MIT Kerberos V5 allows inter-realm user impersonation by malicious realm controllers with shared keys

Original Release date: 31 Jan 2003 | Last revised: 04 Apr 2003

Overview

MIT Kerberos V5 contains a flaw that allows the controller of one Kerberos realm to impersonate users in a second realm.

Description

MIT Kerberos V5 releases prior to 1.2.3 contain a vulnerability that allows users from one realm to impersonate users from other non-local realms that use the same (shared) keys. This vulnerability is the result of a flaw in the chk_trans.c file of the libkrb5 library and affects both the Key Distribution Center (KDC) and other Kerberos application servers.

Impact

This vulnerability may allow users to gain unauthorized access to other realms, with various impacts possible depending on the Kerberos access control list (ACL) for each realm.

Solution

Update your Kerberos installation

This vulnerability was addressed in MIT Kerberos V5 1.2.3. MIT krb5 Security Advisory 2003-001 provides additional information from MIT and is available at:


For information regarding other vendors who may be affected, please see the vendor section of this document.

Follow the suggestions in MIT krb5 Security Advisory 2003-001


MIT krb5 Security Advisory 2003-001 provides the following recommendations for sites that are unable to apply a patch immediately:

    Workarounds:

    Delete or change inter-realm keys so inter-realm authentication is disabled.

    Remove all non-local principals from all critical ACLs in services using old MIT Kerberos code to validate the realm transit path

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MandrakeSoftAffected03 Apr 200304 Apr 2003
Microsoft CorporationAffected25 Jul 200231 Jan 2003
MIT Kerberos Development TeamAffected20 May 200230 Jan 2003
Red Hat Inc.Affected26 Mar 200327 Mar 2003
KTH KerberosUnknown25 Jul 200229 Jan 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

The CERT/CC thanks Joseph Sokol-Margolis and Gerald Britton for discovering this vulnerability and Ken Raeburn of MIT for bringing it to our attention.

This document was written by Shawn Van Ittersum and Jeffrey P. Lanza.

Other Information

  • CVE IDs: CAN-2003-0059
  • Date Public: 28 Jan 2003
  • Date First Published: 31 Jan 2003
  • Date Last Updated: 04 Apr 2003
  • Severity Metric: 14.47
  • Document Revision: 39

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.