lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1NVDoe-0003jh-IN@titan.mandriva.com>
Date: Thu, 14 Jan 2010 01:44:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2010:005 ] krb5


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2010:005
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : krb5
 Date    : January 13, 2010
 Affected: Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in krb5:
 
 The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in
 the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before
 1.6.4 allows remote attackers to cause a denial of service (daemon
 crash) or possibly execute arbitrary code via vectors involving an
 invalid DER encoding that triggers a free of an uninitialized pointer
 (CVE-2009-0846).
 
 The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5
 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to
 cause a denial of service (application crash) via a crafted length
 value that triggers an erroneous malloc call, related to incorrect
 calculations with pointer arithmetic (CVE-2009-0847).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847
 _______________________________________________________________________

 Updated Packages:

 Multi Network Firewall 2.0:
 89a9a2ea150c9a935ef6aae518f9bc6a  mnf/2.0/i586/ftp-client-krb5-1.3-6.11.M20mdk.i586.rpm
 50547a6dcfd037ebd10222b4c25954bc  mnf/2.0/i586/ftp-server-krb5-1.3-6.11.M20mdk.i586.rpm
 7ebbbd6d7374bebdff12ab28da4f3a12  mnf/2.0/i586/krb5-server-1.3-6.11.M20mdk.i586.rpm
 d2f2265f0d9b68df799dc82fadda5887  mnf/2.0/i586/krb5-workstation-1.3-6.11.M20mdk.i586.rpm
 3a467a675f59c3f8ea6778290abebaf6  mnf/2.0/i586/libkrb51-1.3-6.11.M20mdk.i586.rpm
 02601a40f77c526174e26667daf63cc2  mnf/2.0/i586/libkrb51-devel-1.3-6.11.M20mdk.i586.rpm
 43eaff29e6cd398c0b6cdb9dcdf28b74  mnf/2.0/i586/telnet-client-krb5-1.3-6.11.M20mdk.i586.rpm
 99b454ab3a0b20cae15da89ae69aa423  mnf/2.0/i586/telnet-server-krb5-1.3-6.11.M20mdk.i586.rpm 
 55029456c5057afbe7b344a265d2e53a  mnf/2.0/SRPMS/krb5-1.3-6.11.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLTj64mqjQ0CJFipgRAvXvAKDBm8q7/zwFwIKHqzS5CaCi2wRyDQCfSGUC
kvPWmWvFwAf15eT/066xZ4E=
=PqIH
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ