Amazon Linux 1 Security Advisory: ALAS-2017-793
Advisory Release Date: 2017-02-06 18:00 Pacific
Advisory Updated Date: 2017-02-06 18:00 Pacific
A NULL pointer dereference flaw was found in MIT Kerberos kadmind service. An authenticated attacker with permission to modify a principal entry could use this flaw to cause kadmind to dereference a null pointer and crash by supplying an empty DB argument to the modify_principal command, if kadmind was configured to use the LDAP KDB module. (CVE-2016-3119)
A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to dereference a null pointer and crash by making an S4U2Self request, if the restrict_anonymous_to_tgt option was set to true. (CVE-2016-3120)
Affected Packages:
krb5
Issue Correction:
Run yum update krb5 to update your system.
i686:
krb5-debuginfo-1.14.1-27.41.amzn1.i686
krb5-server-1.14.1-27.41.amzn1.i686
krb5-devel-1.14.1-27.41.amzn1.i686
krb5-pkinit-openssl-1.14.1-27.41.amzn1.i686
libkadm5-1.14.1-27.41.amzn1.i686
krb5-libs-1.14.1-27.41.amzn1.i686
krb5-server-ldap-1.14.1-27.41.amzn1.i686
krb5-workstation-1.14.1-27.41.amzn1.i686
src:
krb5-1.14.1-27.41.amzn1.src
x86_64:
krb5-devel-1.14.1-27.41.amzn1.x86_64
krb5-server-1.14.1-27.41.amzn1.x86_64
krb5-server-ldap-1.14.1-27.41.amzn1.x86_64
krb5-workstation-1.14.1-27.41.amzn1.x86_64
libkadm5-1.14.1-27.41.amzn1.x86_64
krb5-pkinit-openssl-1.14.1-27.41.amzn1.x86_64
krb5-libs-1.14.1-27.41.amzn1.x86_64
krb5-debuginfo-1.14.1-27.41.amzn1.x86_64