SCIENTIFIC-LINUX-ERRATA Archives

June 2007

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Wed, 27 Jun 2007 14:56:15 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (38 lines)
Synopsis:	Critical: krb5 security update
Issue date:	2007-06-26
CVE Names:	CVE-2007-2442 CVE-2007-2443 CVE-2007-2798

David Coffey discovered an uninitialized pointer free flaw in the RPC
library used by kadmind. A remote unauthenticated attacker who can access
kadmind could trigger this flaw and cause kadmind to crash or potentially
execute arbitrary code as root. (CVE-2007-2442)

David Coffey also discovered an overflow flaw in the RPC library used by
kadmind. On Scientific Linux, exploitation of this flaw is limited
to a denial of service. A remote unauthenticated attacker who can access
kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)

A stack buffer overflow flaw was found in kadmind. An authenticated
attacker who can access kadmind could trigger this flaw and potentially
execute arbitrary code on the Kerberos server. (CVE-2007-2798)

SL 3.0.x

   SRPMS:
	krb5-1.2.7-66.src.rpm
   i386:
	krb5-devel-1.2.7-66.i386.rpm
	krb5-libs-1.2.7-66.i386.rpm
	krb5-server-1.2.7-66.i386.rpm
	krb5-workstation-1.2.7-66.i386.rpm
   x86_64:
	krb5-devel-1.2.7-66.x86_64.rpm
	krb5-libs-1.2.7-66.i386.rpm
	krb5-libs-1.2.7-66.x86_64.rpm
	krb5-server-1.2.7-66.x86_64.rpm
	krb5-workstation-1.2.7-66.x86_64.rpm


-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2