lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030408012742.GA25159@wirex.com>
Date: Mon, 7 Apr 2003 18:27:42 -0700
From: Immunix Security Team <security@...ex.com>
To: bugtraq@...urityfocus.com, immunix-announce@...unix.org,
	linsec@...ts.seifried.org
Subject: Immunix Secured OS 7+ Kerberos update

-----------------------------------------------------------------------
	Immunix Secured OS Security Advisory

Packages updated:	Kerberos 5
Affected products:	ImmunixOS 7.0, 7+
Bugs fixed:		CAN-2003-0139 CAN-2003-0138 CAN-2003-0028 CAN-2003-0082
Date:			Mon Apr  7 2003
Advisory ID:		IMNX-2003-7+-007-01
Author:			Seth Arnold <sarnold@...ex.com>
-----------------------------------------------------------------------

Description:
  Multiple vulnerabilities have been found in the MIT Kerberos suite.
  This release removes triple-DES support in Kerberos IV and cross-realm
  authentication in Kerberos IV, as both are known to be insecure. This
  release also fixes two denial of service attacks against the Kerberos
  daemons.

  All Kerberos users should upgrade to these packages, with the caveat
  that organizations relying on Kerberos IV cross-realm authentication
  should upgrade to Kerberos 5 first.

  References: http://web.mit.edu/kerberos/www/advisories/
  http://www.securityfocus.com/archive/1/317239/2003-03-29/2003-04-04/0

Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/krb5-devel-1.2.5-1_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/krb5-libs-1.2.5-1_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/krb5-server-1.2.5-1_imnx_1.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/krb5-workstation-1.2.5-1_imnx_1.i386.rpm

Immunix OS 7+ md5sums:
  bf99edf8d08c5c06dd233b14ad0a83a3  krb5-devel-1.2.5-1_imnx_1.i386.rpm
  568ad8140cb696ac928659a1c4011e9e  krb5-libs-1.2.5-1_imnx_1.i386.rpm
  54bbd2710288984a881df5aee9afcfca  krb5-server-1.2.5-1_imnx_1.i386.rpm
  6cc7d97598232886f314e4c5dc9b2540  krb5-workstation-1.2.5-1_imnx_1.i386.rpm


GPG verification:                                                               
  Our public key is available at <http://wirex.com/security/GPG_KEY>.           

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security@...ex.com. WireX 
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ