TSLSA-2004-0032 - kerberos
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0032
Package name: kerberos5
Summary: buffer overflows in krb5_aname_to_localname
Date: 2004-06-02
Affected versions: Trustix Secure Linux 2.1
Trustix Secure Enterprise Linux 2
- --------------------------------------------------------------------------
Package description:
(MIT) Kerberos is a network authentication protocol. It is designed to
provide strong authentication for client/server applications by using
secret-key cryptography. A free implementation of this protocol is
available from the Massachusetts Institute of Technology. Kerberos is
available in many commercial products as well.
Problem description:
The krb5_aname_to_localname() library function contains multiple
buffer overflows which could be exploited to gain unauthorized root
access. Exploitation of these flaws requires an unusual combination
of factors, including successful authentication to a vulnerable
service and a non-default configuration on the target service. (See
MITIGATING FACTORS below.) No exploits are known to exist yet.
Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.
Location:
All Trustix Secure Linux updates are available from
<URI:http://http.trustix.org/pub/trustix/updates/>
<URI:ftp://ftp.trustix.org/pub/trustix/updates/>
About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.
Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.
Public testing:
Most updates for Trustix Secure Linux are made available for public
testing some time before release.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
<URI:http://tsldev.trustix.org/horizon/>
You may also use swup for public testing of updates:
site {
class = 0
location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf"
regexp = ".*"
}
Questions?
Check out our mailing lists:
<URI:http://www.trustix.org/support/>
Verification:
This advisory along with all Trustix packages are signed with the
TSL sign key.
This key is available from:
<URI:http://www.trustix.org/TSL-SIGN-KEY>
The advisory itself is available from the errata pages at
<URI:http://www.trustix.org/errata/trustix-2.1/>
or directly at
<URI:http://www.trustix.org/errata/2004/0032>
MD5sums of the packages:
- --------------------------------------------------------------------------
fb2a416813354ef72793e307109384fc tsel-2/kerberos5-1.3.3-1tr.i586.rpm
3f891b8401083dbd82c1e29214a62093 tsel-2/kerberos5-devel-1.3.3-1tr.i586.rpm
497a9d37c85dc96d54adf6a72aa98d59 tsel-2/kerberos5-libs-1.3.3-1tr.i586.rpm
d4ad236619b37fbca2f87df1db67f914 2.1/rpms/kerberos5-1.3.3-1tr.i586.rpm
c862afd9f44da7f5c422ba57a09d63d0 2.1/rpms/kerberos5-devel-1.3.3-1tr.i586.rpm
23d5c42a1e4bb14a4737af80909f8915 2.1/rpms/kerberos5-libs-1.3.3-1tr.i586.rpm
- --------------------------------------------------------------------------
Trustix Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQFAvcHPi8CEzsK9IksRAmEsAJ9HokI3rEV2gVT7AF+iHZlYe3k1DACeJKM5
tD9SX3VGJjgqWWxVstDyxGw=
=psJB
-----END PGP SIGNATURE-----