[RHSA-2002:242-06] Updated kerberos packages available
Date: Thu, 7 Nov 2002 11:27 -0500
From: [email protected]
To: [email protected], [email protected]
Subject: [RHSA-2002:242-06] Updated kerberos packages available
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated kerberos packages available
Advisory ID: RHSA-2002:242-06
Issue date: 2002-11-07
Updated on: 2002-11-06
Product: Red Hat Linux
Ключевые слова: , , , , , , , , , krb5, kadmind4, (найти похожие документы)
Cross references:=20=20
Obsoletes: RHSA-2002-172
CVE Names: CAN-2002-1235
---------------------------------------------------------------------
1. Topic:
A remotely exploitable stack buffer overflow has been found in the Kerberos
v4 compatibility administration daemon distributed with the Red Hat Linux
krb5 packages.
2. Relevant releases/architectures:
Red Hat Linux 6.2 - alpha, i386, sparc
Red Hat Linux 7.0 - alpha, i386
Red Hat Linux 7.1 - alpha, i386, ia64
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
3. Problem description:
Kerberos is a network authentication system.
A stack buffer overflow has been found in the implementation of the
Kerberos v4 compatibility administration daemon (kadmind4), which is part
of the the MIT krb5 distribution. This vulnerability is present in version
1.2.6 and earlier of the MIT krb5 distribution and can be exploited to gain
unauthorized root access to a KDC host. The attacker does not need to
authenticate to the daemon to successfully perform this attack.
kadmind4 is included in the Kerberos packages in Red Hat Linux 6.2, 7, 7.1,
7.2, 7.3, and 8.0, but by default is not enabled or used.
All users of Kerberos are advised to upgrade to these errata packages which
contain a backported patch and are not vulnerable to this issue.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
5. RPMs required:
Red Hat Linux 6.2:
SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm
alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-configs-1.1.1-30.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-workstation-1.1.1-30.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-server-1.1.1-30.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.rpm
i386:
ftp://updates.redhat.com/6.2/en/os/i386/krb5-configs-1.1.1-30.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/krb5-workstation-1.1.1-30.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/krb5-server-1.1.1-30.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm
sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-configs-1.1.1-30.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-workstation-1.1.1-30.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-server-1.1.1-30.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.rpm
Red Hat Linux 7.0:
SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm
alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm
i386:
ftp://updates.redhat.com/7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/krb5-server-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm
alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm
i386:
ftp://updates.redhat.com/7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/krb5-server-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/krb5-server-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm
Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm
i386:
ftp://updates.redhat.com/7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/krb5-workstation-1.2.4-3.i386.rpm
Red Hat Linux 8.0:
SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm
i386:
ftp://updates.redhat.com/8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/krb5-workstation-1.2.5-7.i386.rpm
6. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
29835dc36d43458e2896d32fcc6aaefc 6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm
a03f069ca6c9b9cf40d4dae5238fea8f 6.2/en/os/alpha/krb5-configs-1.1.1-30.alph=
a.rpm
093d8de8a7a5ff3cd5150f6209f8d33b 6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.=
rpm
2cf89842ac13c56343faf7c3ce702f93 6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.r=
pm
a339c1a19906c541ff5c0ad421fed9ee 6.2/en/os/alpha/krb5-server-1.1.1-30.alpha=
.rpm
195781d7b6b3097a6fc4b6002b053d6a 6.2/en/os/alpha/krb5-workstation-1.1.1-30.=
alpha.rpm
098c6a60ba6509669d27c2fd7bdf6e09 6.2/en/os/i386/krb5-configs-1.1.1-30.i386.=
rpm
974a35ba5f3d987782e89d3b11c53a0e 6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm
878234d08a4a360636b8d1097f66a608 6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm
deaa2561f5a43e4c84c90991f5b6661a 6.2/en/os/i386/krb5-server-1.1.1-30.i386.r=
pm
d14d28cd6b99d784958199a0a324ac40 6.2/en/os/i386/krb5-workstation-1.1.1-30.i=
386.rpm
a8121efd45a11f4989d62ecfaecc785c 6.2/en/os/sparc/krb5-configs-1.1.1-30.spar=
c.rpm
fbd89ccc029ea8f0734c8ff16a8a4070 6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.=
rpm
752d0aba417d373af3ca238ac6aceec9 6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.r=
pm
01bb57e5c29ff56ce05d97a6a63032d0 6.2/en/os/sparc/krb5-server-1.1.1-30.sparc=
.rpm
5a1dd1014348d79e9419b217da397f9f 6.2/en/os/sparc/krb5-workstation-1.1.1-30.=
sparc.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm
4634252b38d5cc0ac793576f418488d7 7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.=
rpm
58d712af3b4bbc9dc8d18c95071f25e2 7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.r=
pm
7dcf3f329b91df414383889ee8861d68 7.0/en/os/alpha/krb5-server-1.2.2-15.alpha=
.rpm
a873196deacca249259faba88ee3dea0 7.0/en/os/alpha/krb5-workstation-1.2.2-15.=
alpha.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.0/en/os/i386/krb5-server-1.2.2-15.i386.r=
pm
95b863c88b71383fe78f5d286b311209 7.0/en/os/i386/krb5-workstation-1.2.2-15.i=
386.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm
4634252b38d5cc0ac793576f418488d7 7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.=
rpm
58d712af3b4bbc9dc8d18c95071f25e2 7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.r=
pm
7dcf3f329b91df414383889ee8861d68 7.1/en/os/alpha/krb5-server-1.2.2-15.alpha=
.rpm
a873196deacca249259faba88ee3dea0 7.1/en/os/alpha/krb5-workstation-1.2.2-15.=
alpha.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.1/en/os/i386/krb5-server-1.2.2-15.i386.r=
pm
95b863c88b71383fe78f5d286b311209 7.1/en/os/i386/krb5-workstation-1.2.2-15.i=
386.rpm
990af79a788a677108e6084b784a0822 7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
8cd2e5c9ee33713e200153d5786c0f11 7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
214314fac18e357f871cb36ee2d4d1c7 7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.r=
pm
1793ab94f8cc2a8913cef009be761291 7.1/en/os/ia64/krb5-workstation-1.2.2-15.i=
a64.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.2/en/os/i386/krb5-server-1.2.2-15.i386.r=
pm
95b863c88b71383fe78f5d286b311209 7.2/en/os/i386/krb5-workstation-1.2.2-15.i=
386.rpm
990af79a788a677108e6084b784a0822 7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
8cd2e5c9ee33713e200153d5786c0f11 7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
214314fac18e357f871cb36ee2d4d1c7 7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.r=
pm
1793ab94f8cc2a8913cef009be761291 7.2/en/os/ia64/krb5-workstation-1.2.2-15.i=
a64.rpm
798f28aa820a9be1521e2a4554c5ea44 7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm
bbdada43207b16dea1f1f70d1605f47c 7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm
ef2c48903f9f39d32af13f42bcc05b32 7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm
a79d2cf51f59cc6b7e1b321dcdb7f303 7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm
6acfd6a13c27b03a6412438b60981d17 7.3/en/os/i386/krb5-workstation-1.2.4-3.i3=
86.rpm
24fb18f8ed3de853a4d1a5661516b77a 8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm
f7135174d00471fb33ff41a93f5c8242 8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm
4eb103a0ffe97d45ec0ddb5977cc208f 8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm
0f9cbbd3381defa181793b28d503884f 8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm
ed8e5d8c8d323d4e85f2a6beef54caf8 8.0/en/os/i386/krb5-workstation-1.2.5-7.i3=
86.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at http://www.redhat.com/about/contact/pgpkey.html
You can verify each package with the following command:
=20=20=20=20
rpm --checksig -v <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
=20=20=20=20
md5sum <filename>
7. References:
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-1235
8. Contact:
The Red Hat security contact is <[email protected]>. More contact
details at http://www.redhat.com/solutions/security/news/contact.html
Copyright(c) 2000, 2001, 2002 Red Hat, Inc.