MIT researchers have uncovered a number of serious security flaws in the Kerberos authentication system, the worst of which could give unauthorized users access to protected corporate networks.
The Massachusetts Institute of Technology has disclosed a number of serious security flaws in the Kerberos v5 authentication system, the worst of which could give unauthorized users access to protected corporate networks.
Various bugs in the Kerberos key distribution center, or KDC, which is used to authenticate users, may allow an attacker to run malicious code on a KDC host, compromising the entire realm served by the KDC, MIT researchers said. Similar flaws affect the krb524d component, also potentially allowing the compromise of an entire authentication realm, and the "krb5_rd_cred()" function, with a more limited impact. A bug in the KDCs ASN.1 decoder can be exploited to cause a vulnerable system to hang, security researchers said.
Kerberos, developed at MIT, is one of the most widely deployed authentication protocols on the Internet, and is implemented in many commercial products; Windows 2000 uses Kerberos v5, for example. MITs advisories on the bugs, found here
contain instructions on patching. Kerberos v5 version 1.3.5 will also fix the bugs when it is released, according to MIT.
Cisco has issued a patch
for the implementation of Kerberos v5 in its VPN 3000 Series Concentrator product fixing the bugs. Linux developers Red Hat, MandrakeSoft
are among the other vendors distributing patches.
Click here to read about vulnerabilities in Cisco products that could allow improper authentication.
Most of the vulnerabilities are double-free errors, where a component attempts to free a buffer that has already been freed; this error can be exploited to execute malicious code and take control of a system, researchers said. Double-free vulnerabilities were identified in Kerberos v5s KDC cleanup code and several client libraries, allowing unauthenticated users to compromise a system, according to an advisory
from Danish security firm Secunia. A double-free bug in krb524d may also allow the execution of malicious code, Secunia researchers said.
Other double-free errors in the "krb5_rd_cred()" function can only be exploited by authenticated users, via services calling on the function, such as krshd, klogind and telnetd, according to Secunia.
Unlike some previous Kerberos flaws, no working exploits have yet been discovered for the flaws, and MIT officials said such exploits would require a high degree of sophistication. "Exploitation of double-free bugs is believed to be difficult," MITs researchers said in the advisory.
On the other hand, exploiting the ASN.1 bug is "trivial," MIT researchers said. The problem is in the way the decoder handles indefinite-length BER encodings. An attacker can send a corrupt encoding which will send the component into an infinite loop, hanging the system, MIT said.
The vulnerabilities are the most serious in Kerberos v5 since early 2003, when multiple issues allowed remote system access, impersonation and denial of service. In October 2002, a flaw
in kadmind4 (Kerberos v4 compatibility administration daemon) allowed unauthenticated attackers to gain root privileges on Kerberos v4 and v5 machines; at that time, MIT researchers said an exploit was already circulating when the patch was released.
Check out eWEEK.coms Security Center
for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.
Be sure to add our eWEEK.com developer and Web services news feed to your RSS newsreader or My Yahoo page