USN-5800-1: Heimdal vulnerabilities

Publication date

12 January 2023

Overview

Several security issues were fixed in Heimdal.


Packages

  • heimdal - Heimdal Kerberos Network Authentication Protocol

Details

It was discovered that Heimdal incorrectly handled certain SPNEGO tokens. A
remote attacker could possibly use this issue to cause a denial of service.
(CVE-2021-44758)

Evgeny Legerov discovered that Heimdal incorrectly handled memory when
performing certain DES decryption operations. A remote attacker could use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2022-3437)

Greg Hudson discovered that Kerberos PAC implementation used in Heimdal
incorrectly handled certain parsing operations. A remote attacker could use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2022-42898)

It was discovered that Heimdal's KDC did not properly handle certain error
conditions. A remote attacker could use this issue to cause a denial of
service, or possibly...

It was discovered that Heimdal incorrectly handled certain SPNEGO tokens. A
remote attacker could possibly use this issue to cause a denial of service.
(CVE-2021-44758)

Evgeny Legerov discovered that Heimdal incorrectly handled memory when
performing certain DES decryption operations. A remote attacker could use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2022-3437)

Greg Hudson discovered that Kerberos PAC implementation used in Heimdal
incorrectly handled certain parsing operations. A remote attacker could use
this issue to cause a denial of service, or possibly execute arbitrary
code. (CVE-2022-42898)

It was discovered that Heimdal's KDC did not properly handle certain error
conditions. A remote attacker could use this issue to cause a denial of
service, or possibly execute arbitrary code. (CVE-2022-44640)


Update instructions

After a standard system update you need to restart any application using Heimdal libraries to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
20.04 focal libgssapi3-heimdal –  7.7.0+dfsg-1ubuntu1.3
libhdb9-heimdal –  7.7.0+dfsg-1ubuntu1.3
libasn1-8-heimdal –  7.7.0+dfsg-1ubuntu1.3
libkrb5-26-heimdal –  7.7.0+dfsg-1ubuntu1.3
libhx509-5-heimdal –  7.7.0+dfsg-1ubuntu1.3
18.04 bionic libgssapi3-heimdal –  7.5.0+dfsg-1ubuntu0.3
libhdb9-heimdal –  7.5.0+dfsg-1ubuntu0.3
libasn1-8-heimdal –  7.5.0+dfsg-1ubuntu0.3
libkrb5-26-heimdal –  7.5.0+dfsg-1ubuntu0.3
libhx509-5-heimdal –  7.5.0+dfsg-1ubuntu0.3
16.04 xenial libgssapi3-heimdal –  1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm3  
libhdb9-heimdal –  1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm3  
libasn1-8-heimdal –  1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm3  
libkrb5-26-heimdal –  1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm3  
libhx509-5-heimdal –  1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm3  
14.04 trusty libgssapi3-heimdal –  1.6~git20131207+dfsg-1ubuntu1.2+esm3  
libhdb9-heimdal –  1.6~git20131207+dfsg-1ubuntu1.2+esm3  
libasn1-8-heimdal –  1.6~git20131207+dfsg-1ubuntu1.2+esm3  
libkrb5-26-heimdal –  1.6~git20131207+dfsg-1ubuntu1.2+esm3  
libhx509-5-heimdal –  1.6~git20131207+dfsg-1ubuntu1.2+esm3  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›