lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20040902123804.GA1918@tsunami.trustix.net>
Date: Thu, 2 Sep 2004 14:38:04 +0200
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSL-2004-0045 - kerberos5


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Bugfix Advisory #2004-0045

Package name:      kerberos5
Summary:           Multiple security holes
Date:              2004-09-02
Affected versions: Trustix Secure Linux 2.1
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:

  (MIT) Kerberos is a network authentication protocol. It is designed to
  provide strong authentication for client/server applications by using
  secret-key cryptography.  A free implementation of this protocol is
  available from the Massachusetts Institute of Technology. Kerberos
  is available in many commercial products as well.

Problem description:

  The MIT Kerberos Development Team has discovered a number of
  vulnerabilities in the MIT Kerberos Version 5 software.  The Common
  Vulnerabilities and Exposures project identifies the following
  vulnerabilities:

  CAN-2004-0642

    A double-free error may allow unauthenticated remote attackers to
    execute arbitrary code on KDC or clients.

  CAN-2004-0643

    Several double-free errors may allow authenticated attackers to
    execute arbitrary code on Kerberos application servers.

  CAN-2004-0644

    A remotely eploitable denial of service vulnerability has been
    found in the KDC and libraries.

  CAN-2004-0772

    Several double-free errors may allow remote attackers to execute
    arbitrary code on the server.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Public testing:
  Most updates for Trustix Secure Linux are made available for public
  testing some time before release.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://tsldev.trustix.org/horizon/>

  You may also use swup for public testing of updates:
  
  site {
      class = 0
      location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf"
      regexp = ".*"
  }
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.1/>
  or directly at
  <URI:http://www.trustix.org/errata/2004/0045>


MD5sums of the packages:
- --------------------------------------------------------------------------
2243efcf49779bf8e515552f7ccfe881  e-2/kerberos5-1.3.4-2tr.i586.rpm
d243eed29594ec05c0b8c14642f00f03  e-2/kerberos5-devel-1.3.4-2tr.i586.rpm
13d949aa3b93115f2c785a2a5002a022  e-2/kerberos5-libs-1.3.4-2tr.i586.rpm
faa0394c9087d4c17ed2220237e99bec  2.1/kerberos5-1.3.4-2tr.i586.rpm
3f682e837c59e48af9e8f5a4646a94b4  2.1/kerberos5-devel-1.3.4-2tr.i586.rpm
670e42d381e0ed638a84ec2a2b2ce29c  2.1/kerberos5-libs-1.3.4-2tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBNxMTi8CEzsK9IksRAt68AJ4wL8gIK89iP2O9BApPfGdov8goBACfZXq5
XCBFwK13detfyDbk7nhhO1w=
=Spkq
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ