[<prev] [next>] [day] [month] [year] [list]
Message-ID: <45a68677.zSew2cRlQGqsdARb%announce-noreply@rpath.com>
Date: Thu, 11 Jan 2007 13:48:23 -0500
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2007-0006-1 krb5 krb5-server krb5-services
krb5-test krb5-workstation
rPath Security Advisory: 2007-0006-1
Published: 2007-01-11
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Remote Deterministic Denial of Service
Updated Versions:
krb5=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1
krb5-server=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1
krb5-services=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1
krb5-test=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1
krb5-workstation=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6144
https://issues.rpath.com/browse/RPL-925
Description:
Previous versions of the krb5 package are vulnerable to two types
of attacks that are known to allow unauthenticated remote attackers
to cause the kadmind process to crash. (One of these vulnerabilities
involves executing code referenced by an uninitialized variable, and
so may possibly enable more serious attacks, up to and including an
unauthenticated remote root privilege escalation.)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists