<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libheimdal</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:2180-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-08-16T18:07:07Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-08-16T18:07:07Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-08-16T18:07:07Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libheimdal</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libheimdal fixes the following issues:

    - Fix CVE-2017-11103: Orpheus' Lyre KDC-REP service name
      validation.
      This is a critical vulnerability.
      In _krb5_extract_ticket() the KDC-REP service name must be
      obtained from encrypted version stored in 'enc_part' instead
      of the unencrypted version stored in 'ticket'.
      Use of the unecrypted version provides an opportunity for
      successful server impersonation and other attacks.
      Identified by Jeffrey Altman, Viktor Duchovni and
      Nico Williams.
      See https://www.orpheus-lyre.info/ for more details. (bsc#1048278)

    - Fix CVE-2017-6594: transit path validation inadvertently 
      caused the previous hop realm to not be added
      to the transit path of issued tickets. This may, in some
      cases, enable bypass of capath policy in Heimdal versions 1.5
      through 7.2.
      Note, this may break sites that rely on the bug. With the bug
      some incomplete [capaths] worked, that should not have.
      These may now break authentication in some cross-realm
      configurations.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:2180-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libheimdal-7.4.0-3.1">
      <FullProductName ProductID="libheimdal-7.4.0-3.1">libheimdal-7.4.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libheimdal-devel-7.4.0-3.1">
      <FullProductName ProductID="libheimdal-devel-7.4.0-3.1">libheimdal-devel-7.4.0-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libheimdal-7.4.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libheimdal-7.4.0-3.1">libheimdal-7.4.0-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libheimdal-devel-7.4.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libheimdal-devel-7.4.0-3.1">libheimdal-devel-7.4.0-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libheimdal-7.4.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libheimdal-7.4.0-3.1">libheimdal-7.4.0-3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libheimdal-devel-7.4.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libheimdal-devel-7.4.0-3.1">libheimdal-devel-7.4.0-3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.</Note>
    </Notes>
    <CVE>CVE-2017-11103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libheimdal-7.4.0-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libheimdal-devel-7.4.0-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libheimdal-7.4.0-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libheimdal-devel-7.4.0-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11103.html</URL>
        <Description>CVE-2017-11103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048278</URL>
        <Description>SUSE Bug 1048278</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.</Note>
    </Notes>
    <CVE>CVE-2017-6594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libheimdal-7.4.0-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libheimdal-devel-7.4.0-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libheimdal-7.4.0-3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libheimdal-devel-7.4.0-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6594.html</URL>
        <Description>CVE-2017-6594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048278</URL>
        <Description>SUSE Bug 1048278</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
