Synopsis: Important: krb5 security update Issue date: 2007-06-26 CVE Names: CVE-2007-2442 CVE-2007-2443 CVE-2007-2798 David Coffey discovered an uninitialized pointer free flaw in the RPC library used by kadmind. On Scientific Linux 4 and 5, glibc detects attempts to free invalid pointers. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2442) David Coffey also discovered an overflow flaw in the RPC library used by kadmind. On Scientific Linux, exploitation of this flaw is limited to a denial of service. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443) A stack buffer overflow flaw was found in kadmind. An authenticated attacker who can access kadmind could trigger this flaw and potentially execute arbitrary code on the Kerberos server. (CVE-2007-2798) SL 4.x SRPMS: krb5-1.3.4-49.src.rpm i386: krb5-devel-1.3.4-49.i386.rpm krb5-libs-1.3.4-49.i386.rpm krb5-server-1.3.4-49.i386.rpm krb5-workstation-1.3.4-49.i386.rpm x86_64: krb5-devel-1.3.4-49.x86_64.rpm krb5-libs-1.3.4-49.i386.rpm krb5-libs-1.3.4-49.x86_64.rpm krb5-server-1.3.4-49.x86_64.rpm krb5-workstation-1.3.4-49.x86_64.rpm SL 5.x SRPMS: krb5-1.5-26.src.rpm i386: krb5-devel-1.5-26.i386.rpm krb5-libs-1.5-26.i386.rpm krb5-server-1.5-26.i386.rpm krb5-workstation-1.5-26.i386.rpm x86_64: krb5-devel-1.5-26.i386.rpm krb5-devel-1.5-26.x86_64.rpm krb5-libs-1.5-26.i386.rpm krb5-libs-1.5-26.x86_64.rpm krb5-server-1.5-26.x86_64.rpm krb5-workstation-1.5-26.x86_64.rpm -Connie Sieh -Troy Dawson