lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070629120859.GA13118@tsunami.trustix.net>
Date: Fri, 29 Jun 2007 13:08:59 +0100
From: Trustix Security Advisor <tsl@...stix.org>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2007-0021 - kerberos5

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2007-0021

Package names:	   kerberos5
Summary:           Multiple vulnerabilities
Date:              2007-06-29
Affected versions: Trustix Secure Linux 2.2
                   Trustix Secure Linux 3.0
                   Trustix Secure Linux 3.0.5
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  kerberos5
  (MIT) Kerberos is a network authentication protocol. It is designed to
  provide strong authentication for client/server applications by using
  secret-key cryptography. A free implementation of this protocol is
  available from the Massachusetts Institute of Technology. Kerberos is
  available in many commercial products as well.

Problem description:
  kerberos5 < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - SECURITY Fix: Some vulnerabilities have been reported in Kerberos,
    which can be exploited by malicious users to compromise a vulnerable
    system.
  - An error exists within the "gssrpc__svcauth_gssapi" function in the
    RPC library, which can cause kadmind and possibly other third-party
    products to free an uninitialised pointer when receiving an RPC
    credential with a length of zero.
  - A signedness error exists within the "gssrpc__svcauth_unix()"
    function in the RPC library, which is used by kadmind and possibly
    other third-party products. This can be exploited to cause a
    stack-based buffer overflow.
  - Fixes stack-based buffer overflow error in kadmind within the
    rename_principal_2_svc function which could allow remote 
    authenticated users to execute arbitrary code via a crafted request
    to rename a principal.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the names CVE-2007-2442, CVE-2007-2443 and CVE-2007-2798
    to these issues. 

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/>
  <URI:http://www.trustix.org/errata/trustix-3.0/> and
  <URI:http://www.trustix.org/errata/trustix-3.0.5/>
  or directly at
  <URI:http://www.trustix.org/errata/2007/0021/>


MD5sums of the packages:
- --------------------------------------------------------------------------
6f48bee85cfe39f80e5484ce99bb0650  3.0.5/rpms/kerberos5-1.4.3-5tr.i586.rpm
659f3f6fce1d91eaa06479583b4e5da6  3.0.5/rpms/kerberos5-devel-1.4.3-5tr.i586.rpm
bd6b5d1a468e30fc36f5f97826a7bdc3  3.0.5/rpms/kerberos5-libs-1.4.3-5tr.i586.rpm

61ff640389980466b95371b3d4461586  3.0/rpms/kerberos5-1.4.1-9tr.i586.rpm
32bc34057013d9a6fe9eada6ed3ced0b  3.0/rpms/kerberos5-devel-1.4.1-9tr.i586.rpm
0becc6d64fc6d50c0ea1af8e7114caf8  3.0/rpms/kerberos5-libs-1.4.1-9tr.i586.rpm

52e757dd22d5f94b01b75f54a0596920  2.2/rpms/kerberos5-1.3.6-8tr.i586.rpm
d26587d79d66d9497748934d9621ca96  2.2/rpms/kerberos5-devel-1.3.6-8tr.i586.rpm
42b65bdba8e49bba71269c82587ec142  2.2/rpms/kerberos5-libs-1.3.6-8tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFGhO6Ei8CEzsK9IksRAuEwAJwOd7L0vX7nytRI8x9XRPxMT4nGawCgoJ0R
k8/Mon4sgZBhWMzG2uqW4XE=
=LEVZ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ