svn rev #23533: trunk/src/ kdc/ lib/kadm5/
tlyu@MIT.EDU
tlyu at MIT.EDU
Mon Dec 28 21:42:51 EST 2009
http://src.mit.edu/fisheye/changelog/krb5/?cs=23533
Commit By: tlyu
Log Message:
ticket: 6608
subject: MITKRB5-SA-2009-003 CVE-2009-3295 KDC null deref in referrals
tags: pullup
target_version: 1.7.1
On certain error conditions, prep_reprocess_req() calls kdc_err() with
a null pointer as the format string, causing a null dereference and
denial of service. Legitimate protocol requests can trigger this
problem.
Changed Files:
U trunk/src/kdc/do_tgs_req.c
U trunk/src/lib/kadm5/logger.c
Modified: trunk/src/kdc/do_tgs_req.c
===================================================================
--- trunk/src/kdc/do_tgs_req.c 2009-12-28 20:13:39 UTC (rev 23532)
+++ trunk/src/kdc/do_tgs_req.c 2009-12-29 02:42:51 UTC (rev 23533)
@@ -1251,7 +1251,7 @@
free(temp_buf);
if (retval) {
/* no match found */
- kdc_err(kdc_context, retval, 0);
+ kdc_err(kdc_context, retval, "unable to find realm of host");
goto cleanup;
}
if (realms == 0) {
Modified: trunk/src/lib/kadm5/logger.c
===================================================================
--- trunk/src/lib/kadm5/logger.c 2009-12-28 20:13:39 UTC (rev 23532)
+++ trunk/src/lib/kadm5/logger.c 2009-12-29 02:42:51 UTC (rev 23533)
@@ -189,6 +189,9 @@
char *cp;
char *syslogp;
+ if (whoami == NULL || format == NULL)
+ return;
+
/* Make the header */
snprintf(outbuf, sizeof(outbuf), "%s: ", whoami);
/*
More information about the cvs-krb5
mailing list