<<< Date Index >>>     <<< Thread Index >>>

MDKSA-2004:156 - Updated krb5 packages fix buffer overflow vulnerability



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           krb5
 Advisory ID:            MDKSA-2004:156
 Date:                   December 22nd, 2004

 Affected versions:      10.0, 10.1, 9.2, Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 Michael Tautschnig discovered a heap buffer overflow in the history
 handling code of libkadm5srv which could be exploited by an
 authenticated user to execute arbitrary code on a Key Distribution
 Center (KDC) server.
 
 The updated packages have been patched to prevent this problem.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1189
  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 5259ecd533fc0565920fbe8aec40cd3d  
10.0/RPMS/ftp-client-krb5-1.3-6.4.100mdk.i586.rpm
 51bec69363fe219e4eec6b73bc1b802d  
10.0/RPMS/ftp-server-krb5-1.3-6.4.100mdk.i586.rpm
 b8d00e7aecf213f9ae4ef5a67451adc2  10.0/RPMS/krb5-server-1.3-6.4.100mdk.i586.rpm
 d4043c430c172f66c9593d14e4399730  
10.0/RPMS/krb5-workstation-1.3-6.4.100mdk.i586.rpm
 746d023be57fe5ddb0dbacac26fc8ebd  10.0/RPMS/libkrb51-1.3-6.4.100mdk.i586.rpm
 6a4e0e161543ecb0e0b5c5bfe011dfcf  
10.0/RPMS/libkrb51-devel-1.3-6.4.100mdk.i586.rpm
 3eaa8cff9b16a32db93ec1e895a01998  
10.0/RPMS/telnet-client-krb5-1.3-6.4.100mdk.i586.rpm
 ffbe1fbcea8c618ba2bffaaae0bcedf0  
10.0/RPMS/telnet-server-krb5-1.3-6.4.100mdk.i586.rpm
 16d8b9d874e834149065db8bca4161dc  10.0/SRPMS/krb5-1.3-6.4.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 f3e89b08aff5e719ee32b17b450df7e6  
amd64/10.0/RPMS/ftp-client-krb5-1.3-6.4.100mdk.amd64.rpm
 8fa797c90b0336f8b8650d0fed32c166  
amd64/10.0/RPMS/ftp-server-krb5-1.3-6.4.100mdk.amd64.rpm
 9cebf80fcfaefb123c98a31b6bd279ca  
amd64/10.0/RPMS/krb5-server-1.3-6.4.100mdk.amd64.rpm
 a52c18d67660dc19e370b9690315339b  
amd64/10.0/RPMS/krb5-workstation-1.3-6.4.100mdk.amd64.rpm
 e605f5765eddd4eaa1e6974f07723c73  
amd64/10.0/RPMS/lib64krb51-1.3-6.4.100mdk.amd64.rpm
 2559fd1f6695b03224862f472cfc4c7d  
amd64/10.0/RPMS/lib64krb51-devel-1.3-6.4.100mdk.amd64.rpm
 3f8d481a719a231dee5298c9081c37e8  
amd64/10.0/RPMS/telnet-client-krb5-1.3-6.4.100mdk.amd64.rpm
 6d767b9d0acb2d9028b56bfce19b4468  
amd64/10.0/RPMS/telnet-server-krb5-1.3-6.4.100mdk.amd64.rpm
 16d8b9d874e834149065db8bca4161dc  amd64/10.0/SRPMS/krb5-1.3-6.4.100mdk.src.rpm

 Mandrakelinux 10.1:
 10e1a075457e7c4afa70825c83e86d76  
10.1/RPMS/ftp-client-krb5-1.3.4-2.1.101mdk.i586.rpm
 8798a2f601f24b2751a4d465d4f98ca2  
10.1/RPMS/ftp-server-krb5-1.3.4-2.1.101mdk.i586.rpm
 78475d53992fbf48c761fc29f96b8535  
10.1/RPMS/krb5-server-1.3.4-2.1.101mdk.i586.rpm
 ecd91754869b7200ee8b0dc09577750a  
10.1/RPMS/krb5-workstation-1.3.4-2.1.101mdk.i586.rpm
 5d792e412854a5e4dabf6be549489896  10.1/RPMS/libkrb53-1.3.4-2.1.101mdk.i586.rpm
 bb7086eb3c1f2e87b70b270a83e42e54  
10.1/RPMS/libkrb53-devel-1.3.4-2.1.101mdk.i586.rpm
 333e3c7c4d764ebb32ee8ff34a1b7fa1  
10.1/RPMS/telnet-client-krb5-1.3.4-2.1.101mdk.i586.rpm
 42e03d7080fdbd9839de8b65c85b1b68  
10.1/RPMS/telnet-server-krb5-1.3.4-2.1.101mdk.i586.rpm
 0ea19d548852538b26066f75b7ef280d  10.1/SRPMS/krb5-1.3.4-2.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 aaf71808c6ad43416f008af590620930  
x86_64/10.1/RPMS/ftp-client-krb5-1.3.4-2.1.101mdk.x86_64.rpm
 c6726c1b5c1c2278c5634b856da7c3d3  
x86_64/10.1/RPMS/ftp-server-krb5-1.3.4-2.1.101mdk.x86_64.rpm
 a16f8dd425a3cbcd3d73a77a39363deb  
x86_64/10.1/RPMS/krb5-server-1.3.4-2.1.101mdk.x86_64.rpm
 7926914181c2183b8953f9e923eb9f69  
x86_64/10.1/RPMS/krb5-workstation-1.3.4-2.1.101mdk.x86_64.rpm
 439c0603bb36786883009595b4b2c346  
x86_64/10.1/RPMS/lib64krb53-1.3.4-2.1.101mdk.x86_64.rpm
 0fb403b8d2d7258f947b8e518218dbcd  
x86_64/10.1/RPMS/lib64krb53-devel-1.3.4-2.1.101mdk.x86_64.rpm
 7e0829d328491a5173ac145cb9211ab9  
x86_64/10.1/RPMS/telnet-client-krb5-1.3.4-2.1.101mdk.x86_64.rpm
 529984cdea656be82188dc7b8e807789  
x86_64/10.1/RPMS/telnet-server-krb5-1.3.4-2.1.101mdk.x86_64.rpm
 0ea19d548852538b26066f75b7ef280d  
x86_64/10.1/SRPMS/krb5-1.3.4-2.1.101mdk.src.rpm

 Corporate Server 2.1:
 b6b07e10c2a5c1dfec9894c48eaa59fc  
corporate/2.1/RPMS/ftp-client-krb5-1.2.5-1.8.C21mdk.i586.rpm
 0840970f8d38eb91807435379918da4e  
corporate/2.1/RPMS/ftp-server-krb5-1.2.5-1.8.C21mdk.i586.rpm
 f5f79c6cb56232bc2d513902824eaca1  
corporate/2.1/RPMS/krb5-devel-1.2.5-1.8.C21mdk.i586.rpm
 0388d0814b2fd7899e804264471ec38d  
corporate/2.1/RPMS/krb5-libs-1.2.5-1.8.C21mdk.i586.rpm
 647c93e42a069205ccf6c085c0d5337e  
corporate/2.1/RPMS/krb5-server-1.2.5-1.8.C21mdk.i586.rpm
 3756c27aa8fde4e81bb35bc6896f5d2b  
corporate/2.1/RPMS/krb5-workstation-1.2.5-1.8.C21mdk.i586.rpm
 37c17167f8ef7b5e4eeceb60a17a3804  
corporate/2.1/RPMS/telnet-client-krb5-1.2.5-1.8.C21mdk.i586.rpm
 dbac3b9e2bc0d60af9c5d9c2e55e53df  
corporate/2.1/RPMS/telnet-server-krb5-1.2.5-1.8.C21mdk.i586.rpm
 847feb907c3022f0279f6cec8a1ab28d  
corporate/2.1/SRPMS/krb5-1.2.5-1.8.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 f1489d64518efaf2eaa73d1d7b69343c  
x86_64/corporate/2.1/RPMS/ftp-client-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
 a161fb6d0cb8b045491ec64117b413c6  
x86_64/corporate/2.1/RPMS/ftp-server-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
 9ec1d7ac348640bd1d464a58b5390f04  
x86_64/corporate/2.1/RPMS/krb5-devel-1.2.5-1.8.C21mdk.x86_64.rpm
 aa42b2e5934d95cde48ffb705e55fb62  
x86_64/corporate/2.1/RPMS/krb5-libs-1.2.5-1.8.C21mdk.x86_64.rpm
 8fa79e2d839c4d0f2dba664029b8e64b  
x86_64/corporate/2.1/RPMS/krb5-server-1.2.5-1.8.C21mdk.x86_64.rpm
 052a4fde53a2a066a1bbd001b4b20742  
x86_64/corporate/2.1/RPMS/krb5-workstation-1.2.5-1.8.C21mdk.x86_64.rpm
 a8b3bbbc1a6f9425a33df27a7e317ab7  
x86_64/corporate/2.1/RPMS/telnet-client-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
 407ef805887d30a942b82ce37e2db63d  
x86_64/corporate/2.1/RPMS/telnet-server-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
 847feb907c3022f0279f6cec8a1ab28d  
x86_64/corporate/2.1/SRPMS/krb5-1.2.5-1.8.C21mdk.src.rpm

 Mandrakelinux 9.2:
 ceb891e96c0c18c775f0775335d7daed  
9.2/RPMS/ftp-client-krb5-1.3-3.4.92mdk.i586.rpm
 737826c759a0366b3f1e1a5e08ba68e7  
9.2/RPMS/ftp-server-krb5-1.3-3.4.92mdk.i586.rpm
 e88cbf35407e09b34987440d41fc46c0  9.2/RPMS/krb5-server-1.3-3.4.92mdk.i586.rpm
 5572f323cc19bf3df6bbd4619200e6ce  
9.2/RPMS/krb5-workstation-1.3-3.4.92mdk.i586.rpm
 f39fd4c4e2722b75af178efb5c53270c  9.2/RPMS/libkrb51-1.3-3.4.92mdk.i586.rpm
 1e2fc6b6750057bc2c86109843472e93  
9.2/RPMS/libkrb51-devel-1.3-3.4.92mdk.i586.rpm
 a9f3fe282ce9633ea7633a9ef1ee5e8c  
9.2/RPMS/telnet-client-krb5-1.3-3.4.92mdk.i586.rpm
 fd56a352d88b0a4366a694983226dcf0  
9.2/RPMS/telnet-server-krb5-1.3-3.4.92mdk.i586.rpm
 003b0c283b689682d975b64cb0abb8ef  9.2/SRPMS/krb5-1.3-3.4.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 ca86cfd5de3e31eca88d33040a4fbbcf  
amd64/9.2/RPMS/ftp-client-krb5-1.3-3.4.92mdk.amd64.rpm
 fdc91c66742b8c234f7ec625b446b754  
amd64/9.2/RPMS/ftp-server-krb5-1.3-3.4.92mdk.amd64.rpm
 20da9152c854ee5882fe0b1a84c6b938  
amd64/9.2/RPMS/krb5-server-1.3-3.4.92mdk.amd64.rpm
 66b41ebc03f3b945fe16eb7683f113a7  
amd64/9.2/RPMS/krb5-workstation-1.3-3.4.92mdk.amd64.rpm
 d2c69d6dce82a1118c83aa0558c45656  
amd64/9.2/RPMS/lib64krb51-1.3-3.4.92mdk.amd64.rpm
 39d72a1fb616203e710e962c16f4c3f2  
amd64/9.2/RPMS/lib64krb51-devel-1.3-3.4.92mdk.amd64.rpm
 a7903a38ba17da110a4493ddf61c5f41  
amd64/9.2/RPMS/telnet-client-krb5-1.3-3.4.92mdk.amd64.rpm
 bdb463f1f851819b2098ff5f0f7305ea  
amd64/9.2/RPMS/telnet-server-krb5-1.3-3.4.92mdk.amd64.rpm
 003b0c283b689682d975b64cb0abb8ef  amd64/9.2/SRPMS/krb5-1.3-3.4.92mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFByZr7mqjQ0CJFipgRAs0MAJ4jHxa8A2NdcHHOp7azY/vD5vl8OwCaAoWe
FoyKkZrOqyhva6vHv65q+80=
=yLnq
-----END PGP SIGNATURE-----