Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Gentoo Linux Advisory: Heimdal

May 28, 2004, 00:13 (0 Talkback[s])

Gentoo Linux Security Advisory GLSA 200405-23

http://security.gentoo.org/


Severity: High
Title: Heimdal: Kerberos 4 buffer overflow in kadmin
Date: May 27, 2004
Bugs: #50208
ID: 200405-23


Synopsis

A possible buffer overflow in the Kerberos 4 component of Heimdal has been discovered.

Background

Heimdal is a free implementation of Kerberos.

Affected packages


Package / Vulnerable / Unaffected
1 app-crypt/heimdal < 0.6.2 >= 0.6.2

Description

A buffer overflow was discovered in kadmind, a server for administrative access to the Kerberos database.

Impact

By sending a specially formatted message to kadmind, a remote attacker may be able to crash kadmind causing a denial of service, or execute arbitrary code with the permissions of the kadmind process.

Workaround

For a temporary workaround, providing you do not require Kerberos 4 support, you may turn off Kerberos 4 kadmin by running kadmind with the --no-kerberos4 option.

Resolution

All Heimdal users should upgrade to the latest stable version:

    # emerge sync
    # emerge -pv ">=app-crypt/heimdal-0.6.2"
    # emerge ">=app-crypt/heimdal-0.6.2"

References

[ 1 ] Heimdal 0.6.2 Release Notice

http://www.pdc.kth.se/heimdal/advisory/2004-05-06/ [ 2 ] CAN-2004-0434

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0434

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200405-23.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2004 Gentoo Technologies, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0