CentOS Errata and Security Advisory CESA-2007:0384
Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. kadmind is the KADM5 administration server.
David Coffey discovered an uninitialized pointer free flaw in the RPC library used by kadmind. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash or potentially execute arbitrary code as root. (CVE-2007-2442)
David Coffey also discovered an overflow flaw in the RPC library used by kadmind. On Red Hat Enterprise Linux, exploitation of this flaw is limited to a denial of service. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)
A stack buffer overflow flaw was found in kadmind. An authenticated attacker who can access kadmind could trigger this flaw and potentially execute arbitrary code on the Kerberos server. (CVE-2007-2798)
For Red Hat Enterprise Linux 2.1, several portability bugs which would lead to unexpected crashes on the ia64 platform have also been fixed.
Users of krb5-server are advised to update to these erratum packages which contain backported fixes to correct these issues.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2007-June/026012.html http://lists.centos.org/pipermail/centos-announce/2007-June/026013.html http://lists.centos.org/pipermail/centos-announce/2007-June/026041.html http://lists.centos.org/pipermail/centos-announce/2007-June/026045.html
Affected packages: krb5 krb5-devel krb5-libs krb5-server krb5-workstation
Upstream details at: https://rhn.redhat.com/errata/RHSA-2007-0384.html