krb5 security update

2007-09-05T00:50:27
ID CESA-2007:0858
Type centos
Reporter CentOS Project
Modified 2007-09-05T00:50:27

Description

CentOS Errata and Security Advisory CESA-2007:0858

Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. kadmind is the KADM5 administration server.

Tenable Network Security discovered a stack buffer overflow flaw in the RPC library used by kadmind. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. On Red Hat Enterprise Linux 5 it is not possible to exploit this flaw to run arbitrary code as the overflow is blocked by FORTIFY_SOURCE. (CVE-2007-3999)

Garrett Wollman discovered an uninitialized pointer flaw in kadmind. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-4000)

These issues did not affect the versions of Kerberos distributed with Red Hat Enterprise Linux 2.1, 3, or 4.

Users of krb5-server are advised to update to these erratum packages which contain backported fixes to correct these issues.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2007-September/026214.html http://lists.centos.org/pipermail/centos-announce/2007-September/026215.html

Affected packages: krb5 krb5-devel krb5-libs krb5-server krb5-workstation

Upstream details at: https://rhn.redhat.com/errata/RHSA-2007-0858.html