Date:         Wed, 27 Jun 2007 14:56:15 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for krb5 on SL3,x i386/x86_64
Comments: To: scientific-linux-errata@fnal.gov

Synopsis:	Critical: krb5 security update
Issue date:	2007-06-26
CVE Names:	CVE-2007-2442 CVE-2007-2443 CVE-2007-2798

David Coffey discovered an uninitialized pointer free flaw in the RPC
library used by kadmind. A remote unauthenticated attacker who can access
kadmind could trigger this flaw and cause kadmind to crash or potentially
execute arbitrary code as root. (CVE-2007-2442)

David Coffey also discovered an overflow flaw in the RPC library used by
kadmind. On Scientific Linux, exploitation of this flaw is limited
to a denial of service. A remote unauthenticated attacker who can access
kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)

A stack buffer overflow flaw was found in kadmind. An authenticated
attacker who can access kadmind could trigger this flaw and potentially
execute arbitrary code on the Kerberos server. (CVE-2007-2798)

SL 3.0.x

   SRPMS:
	krb5-1.2.7-66.src.rpm
   i386:
	krb5-devel-1.2.7-66.i386.rpm
	krb5-libs-1.2.7-66.i386.rpm
	krb5-server-1.2.7-66.i386.rpm
	krb5-workstation-1.2.7-66.i386.rpm
   x86_64:
	krb5-devel-1.2.7-66.x86_64.rpm
	krb5-libs-1.2.7-66.i386.rpm
	krb5-libs-1.2.7-66.x86_64.rpm
	krb5-server-1.2.7-66.x86_64.rpm
	krb5-workstation-1.2.7-66.x86_64.rpm


-Connie Sieh
-Troy Dawson

SciLinux: CVE-2007-2442 krb5 SL3,x i386/x86_64

Critical: krb5 security update

Summary

Date:         Wed, 27 Jun 2007 14:56:15 -0500Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for krb5 on SL3,x i386/x86_64Comments: To: scientific-linux-errata@fnal.govSynopsis:	Critical: krb5 security updateIssue date:	2007-06-26CVE Names:	CVE-2007-2442 CVE-2007-2443 CVE-2007-2798David Coffey discovered an uninitialized pointer free flaw in the RPClibrary used by kadmind. A remote unauthenticated attacker who can accesskadmind could trigger this flaw and cause kadmind to crash or potentiallyexecute arbitrary code as root. (CVE-2007-2442)David Coffey also discovered an overflow flaw in the RPC library used bykadmind. On Scientific Linux, exploitation of this flaw is limitedto a denial of service. A remote unauthenticated attacker who can accesskadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)A stack buffer overflow flaw was found in kadmind. An authenticatedattacker who can access kadmind could trigger this flaw and potentiallyexecute arbitrary code on the Kerberos server. (CVE-2007-2798)SL 3.0.x   SRPMS:	krb5-1.2.7-66.src.rpm   i386:	krb5-devel-1.2.7-66.i386.rpm	krb5-libs-1.2.7-66.i386.rpm	krb5-server-1.2.7-66.i386.rpm	krb5-workstation-1.2.7-66.i386.rpm   x86_64:	krb5-devel-1.2.7-66.x86_64.rpm	krb5-libs-1.2.7-66.i386.rpm	krb5-libs-1.2.7-66.x86_64.rpm	krb5-server-1.2.7-66.x86_64.rpm	krb5-workstation-1.2.7-66.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News