CentOS Errata and Security Advisory CESA-2007:0858
Kerberos is a network authentication system which allows clients and servers to authenticate to each other through use of symmetric encryption and a trusted third party, the KDC. kadmind is the KADM5 administration server.
Tenable Network Security discovered a stack buffer overflow flaw in the RPC library used by kadmind. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. On Red Hat Enterprise Linux 5 it is not possible to exploit this flaw to run arbitrary code as the overflow is blocked by FORTIFY_SOURCE. (CVE-2007-3999)
Garrett Wollman discovered an uninitialized pointer flaw in kadmind. A remote unauthenticated attacker who can access kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-4000)
These issues did not affect the versions of Kerberos distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
Users of krb5-server are advised to update to these erratum packages which contain backported fixes to correct these issues.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2007-September/026214.html http://lists.centos.org/pipermail/centos-announce/2007-September/026215.html
Affected packages: krb5 krb5-devel krb5-libs krb5-server krb5-workstation
Upstream details at: https://rhn.redhat.com/errata/RHSA-2007-0858.html