krb5 security update

2007-06-26T20:37:06
ID CESA-2007:0384
Type centos
Reporter CentOS Project
Modified 2007-06-29T20:23:33

Description

CentOS Errata and Security Advisory CESA-2007:0384

Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. kadmind is the KADM5 administration server.

David Coffey discovered an uninitialized pointer free flaw in the RPC library used by kadmind. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash or potentially execute arbitrary code as root. (CVE-2007-2442)

David Coffey also discovered an overflow flaw in the RPC library used by kadmind. On Red Hat Enterprise Linux, exploitation of this flaw is limited to a denial of service. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)

A stack buffer overflow flaw was found in kadmind. An authenticated attacker who can access kadmind could trigger this flaw and potentially execute arbitrary code on the Kerberos server. (CVE-2007-2798)

For Red Hat Enterprise Linux 2.1, several portability bugs which would lead to unexpected crashes on the ia64 platform have also been fixed.

Users of krb5-server are advised to update to these erratum packages which contain backported fixes to correct these issues.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2007-June/013974.html http://lists.centos.org/pipermail/centos-announce/2007-June/013975.html http://lists.centos.org/pipermail/centos-announce/2007-June/014003.html http://lists.centos.org/pipermail/centos-announce/2007-June/014007.html

Affected packages: krb5 krb5-devel krb5-libs krb5-server krb5-workstation

Upstream details at: https://rhn.redhat.com/errata/RHSA-2007-0384.html