Kerberos Holes Could Bring Serious Exploits
While none has yet been reported, the vulnerabilities uncovered by MIT researchers could cause "double free" errors or send the component into an endless loop.
Researchers at the Massachusetts Institute of Technology have reported the discovery of several potential vulnerabilities in the Kerberos Key Distribution Center that could allow an attacker to run malicious code on the target machine. As reported earlier, a fix is expected for these vulnerabilities in the near future. In the case of Cisco VPN products using Kerberos, such a patch has already been issued. The vulnerability that is potentially the most serious involves whats called a "double free" error, in which the cleanup module attempts to clear the same buffer twice. When this happens, its possible that an attacker could compromise Kerberos. The second, called the ASN.1 bug, involves the potential to cause a module to hang, bringing Kerberos to a halt.
Click here to read about how vulnerabilities in core libraries can have a far wider impact than expected.
Assuming you have a well-designed network that can prevent unauthorized remote access, the risk of these vulnerabilities is minimized simply because the attacker would have to have physical access to your network. But VPN access that uses Kerberos authentication is, of course, vulnerable until patched. Cisco users can solve that problem immediately, but its not clear that others can do so just yet without applying patches manually.
Unfortunately, exploits of the ASN.1 bug in Kerberos arent so difficult. That bug will cause the system in which its installed to hang, interfering with or preventing operations involving Kerberos. To cause this result, all thats required is a corrupt encoding that will in turn cause the component to go into an endless loop. MIT researchers say this exploit is trivial to create. While no such exploit has been identified here, either, you can expect one to appear.
For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog.
Either way, you should consider it critical that these vulnerabilities are patched as soon as possible. An exploit could leave your entire enterprise open to anyone who wanted in, or at the very least, you could find your Kerberos authentication inoperative.
The soon to be released krb5-1.3.5 version of Kerberos will contain fixes for all of these vulnerabilities. But you can patch your most critical systems now, and you should. Yes, it will require some work, but not nearly as much as a successful exploit.
Check out eWEEK.coms Security Center at http://security.eweek.com for security news, views and analysis.

Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page:























