Sender: |
|
Date: |
Wed, 27 Jun 2007 14:53:51 -0500 |
MIME-version: |
1.0 |
Reply-To: |
|
Content-type: |
text/plain; format=flowed; charset=ISO-8859-1 |
Subject: |
|
From: |
|
Content-transfer-encoding: |
7BIT |
Comments: |
|
Parts/Attachments: |
|
|
Synopsis: Important: krb5 security update
Issue date: 2007-06-26
CVE Names: CVE-2007-2442 CVE-2007-2443 CVE-2007-2798
David Coffey discovered an uninitialized pointer free flaw in the RPC
library used by kadmind. On Scientific Linux 4 and 5, glibc
detects attempts to free invalid pointers. A remote unauthenticated
attacker who can access kadmind could trigger this flaw and cause kadmind
to crash. (CVE-2007-2442)
David Coffey also discovered an overflow flaw in the RPC library used by
kadmind. On Scientific Linux, exploitation of this flaw is limited
to a denial of service. A remote unauthenticated attacker who can access
kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)
A stack buffer overflow flaw was found in kadmind. An authenticated
attacker who can access kadmind could trigger this flaw and potentially
execute arbitrary code on the Kerberos server. (CVE-2007-2798)
SL 4.x
SRPMS:
krb5-1.3.4-49.src.rpm
i386:
krb5-devel-1.3.4-49.i386.rpm
krb5-libs-1.3.4-49.i386.rpm
krb5-server-1.3.4-49.i386.rpm
krb5-workstation-1.3.4-49.i386.rpm
x86_64:
krb5-devel-1.3.4-49.x86_64.rpm
krb5-libs-1.3.4-49.i386.rpm
krb5-libs-1.3.4-49.x86_64.rpm
krb5-server-1.3.4-49.x86_64.rpm
krb5-workstation-1.3.4-49.x86_64.rpm
SL 5.x
SRPMS:
krb5-1.5-26.src.rpm
i386:
krb5-devel-1.5-26.i386.rpm
krb5-libs-1.5-26.i386.rpm
krb5-server-1.5-26.i386.rpm
krb5-workstation-1.5-26.i386.rpm
x86_64:
krb5-devel-1.5-26.i386.rpm
krb5-devel-1.5-26.x86_64.rpm
krb5-libs-1.5-26.i386.rpm
krb5-libs-1.5-26.x86_64.rpm
krb5-server-1.5-26.x86_64.rpm
krb5-workstation-1.5-26.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|