"An unauthenticated user may cause execution of arbitrary code in kadmind, which can compromise the Kerberos key database and host security. (kadmind usually runs as root.) Unsuccessful exploitation, or even accidental replication of the required conditions by non-malicious users, can result in kadmind crashing." http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143 Patch from MIT.
25 lines
657 B
Text
25 lines
657 B
Text
$NetBSD: patch-at,v 1.1 2007/01/17 23:43:47 salo Exp $
|
|
|
|
Security fix for CVE-2006-6143.
|
|
|
|
--- lib/rpc/svc.c.orig 2004-09-21 20:20:15.000000000 +0200
|
|
+++ lib/rpc/svc.c 2007-01-17 21:58:10.000000000 +0100
|
|
@@ -436,6 +436,8 @@ svc_getreqset(FDSET_TYPE *readfds)
|
|
#endif
|
|
}
|
|
|
|
+extern struct svc_auth_ops svc_auth_gss_ops;
|
|
+
|
|
static void
|
|
svc_do_xprt(SVCXPRT *xprt)
|
|
{
|
|
@@ -517,6 +519,9 @@ svc_do_xprt(SVCXPRT *xprt)
|
|
if ((stat = SVC_STAT(xprt)) == XPRT_DIED){
|
|
SVC_DESTROY(xprt);
|
|
break;
|
|
+ } else if ((xprt->xp_auth != NULL) &&
|
|
+ (xprt->xp_auth->svc_ah_ops != &svc_auth_gss_ops)) {
|
|
+ xprt->xp_auth = NULL;
|
|
}
|
|
} while (stat == XPRT_MOREREQS);
|
|
|