Synopsis: Critical: krb5 security update
Issue date: 2007-06-26
CVE Names: CVE-2007-2442 CVE-2007-2443 CVE-2007-2798
David Coffey discovered an uninitialized pointer free flaw in the RPC
library used by kadmind. A remote unauthenticated attacker who can access
kadmind could trigger this flaw and cause kadmind to crash or potentially
execute arbitrary code as root. (CVE-2007-2442)
David Coffey also discovered an overflow flaw in the RPC library used by
kadmind. On Scientific Linux, exploitation of this flaw is limited
to a denial of service. A remote unauthenticated attacker who can access
kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)
A stack buffer overflow flaw was found in kadmind. An authenticated
attacker who can access kadmind could trigger this flaw and potentially
execute arbitrary code on the Kerberos server. (CVE-2007-2798)
SL 3.0.x
SRPMS:
krb5-1.2.7-66.src.rpm
i386:
krb5-devel-1.2.7-66.i386.rpm
krb5-libs-1.2.7-66.i386.rpm
krb5-server-1.2.7-66.i386.rpm
krb5-workstation-1.2.7-66.i386.rpm
x86_64:
krb5-devel-1.2.7-66.x86_64.rpm
krb5-libs-1.2.7-66.i386.rpm
krb5-libs-1.2.7-66.x86_64.rpm
krb5-server-1.2.7-66.x86_64.rpm
krb5-workstation-1.2.7-66.x86_64.rpm
-Connie Sieh
-Troy Dawson