The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


TSLSA-2007-0021 - kerberos5


<< Previous INDEX Search src / Print Next >>
Date: Fri, 29 Jun 2007 13:08:59 +0100
From: Trustix Security Advisor <tsl@trustix.org.>
To: [email protected]
Subject: TSLSA-2007-0021 - kerberos5
Message-ID: <20070629120859.GA13118@tsunami.trustix.net.>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.4.2.1i
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2007-0021


Package names:	   kerberos5
Summary:           Multiple vulnerabilities
Date:              2007-06-29
Affected versions: Trustix Secure Linux 2.2
                   Trustix Secure Linux 3.0
                   Trustix Secure Linux 3.0.5
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  kerberos5
  (MIT) Kerberos is a network authentication protocol. It is designed to
  provide strong authentication for client/server applications by using
  secret-key cryptography. A free implementation of this protocol is
  available from the Massachusetts Institute of Technology. Kerberos is
  available in many commercial products as well.


Problem description:
  kerberos5 < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - SECURITY Fix: Some vulnerabilities have been reported in Kerberos,
    which can be exploited by malicious users to compromise a vulnerable
    system.
  - An error exists within the "gssrpc__svcauth_gssapi" function in the
    RPC library, which can cause kadmind and possibly other third-party
    products to free an uninitialised pointer when receiving an RPC
    credential with a length of zero.
  - A signedness error exists within the "gssrpc__svcauth_unix()"
    function in the RPC library, which is used by kadmind and possibly
    other third-party products. This can be exploited to cause a
    stack-based buffer overflow.
  - Fixes stack-based buffer overflow error in kadmind within the
    rename_principal_2_svc function which could allow remote 
    authenticated users to execute arbitrary code via a crafted request
    to rename a principal.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2007-2442, CVE-2007-2443 and CVE-2007-2798
    to these issues. 

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>;
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>;


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>;


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>;

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/>;
  <URI:http://www.trustix.org/errata/trustix-3.0/>; and
  <URI:http://www.trustix.org/errata/trustix-3.0.5/>;
  or directly at
  <URI:http://www.trustix.org/errata/2007/0021/>;


MD5sums of the packages:
- --------------------------------------------------------------------------
6f48bee85cfe39f80e5484ce99bb0650  3.0.5/rpms/kerberos5-1.4.3-5tr.i586.rpm
659f3f6fce1d91eaa06479583b4e5da6  3.0.5/rpms/kerberos5-devel-1.4.3-5tr.i586.rpm
bd6b5d1a468e30fc36f5f97826a7bdc3  3.0.5/rpms/kerberos5-libs-1.4.3-5tr.i586.rpm

61ff640389980466b95371b3d4461586  3.0/rpms/kerberos5-1.4.1-9tr.i586.rpm
32bc34057013d9a6fe9eada6ed3ced0b  3.0/rpms/kerberos5-devel-1.4.1-9tr.i586.rpm
0becc6d64fc6d50c0ea1af8e7114caf8  3.0/rpms/kerberos5-libs-1.4.1-9tr.i586.rpm

52e757dd22d5f94b01b75f54a0596920  2.2/rpms/kerberos5-1.3.6-8tr.i586.rpm
d26587d79d66d9497748934d9621ca96  2.2/rpms/kerberos5-devel-1.3.6-8tr.i586.rpm
42b65bdba8e49bba71269c82587ec142  2.2/rpms/kerberos5-libs-1.3.6-8tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFGhO6Ei8CEzsK9IksRAuEwAJwOd7L0vX7nytRI8x9XRPxMT4nGawCgoJ0R
k8/Mon4sgZBhWMzG2uqW4XE=
=LEVZ
-----END PGP SIGNATURE-----


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру