GLSA: krb5

From: Daniel Ahlberg (alizat_private)
Date: Mon Oct 28 2002 - 06:34:30 PST

  • Next message: EnGarde Secure Linux: "[Full-Disclosure] [ESA-20021029-027] mod_ssl cross-site scripting vulnerability."

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200210-011
    - - --------------------------------------------------------------------
    
    PACKAGE : krb5
    SUMMARY : buffer overflow
    DATE    : 2002-10-28 14:10 UTC
    EXPLOIT : remote
    
    - - --------------------------------------------------------------------
    
    A stack buffer overflow in the implementation of the Kerberos v4
    compatibility administration daemon (kadmind4) in the MIT krb5
    distribution can be exploited to gain unauthorized root access to a
    KDC host.  The attacker does not need to authenticate to the daemon to
    successfully perform this attack.  At least one exploit is known to
    exist in the wild, and at least one attacker is reasonably competent
    at cleaning up traces of intrusion.
    
    Read the full advisory at
    http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    app-crypt/krb5 and earlier update their systems as follows:
    
    emerge rsync
    emerge krb5
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE9vUr1fT7nyhUpoZMRAhvRAJ9zxSpTuroJ57RA9lVFegHfCODgkgCbBGRb
    4qBVkt0y6Ndn9pVFt0zrplo=
    =SacS
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Tue Oct 29 2002 - 00:21:32 PST