Date:         Wed, 27 Jun 2007 14:53:51 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for krb5 on SL5.x, SL4.x, SL3,x i386/x86_64
Comments: To: scientific-linux-errata@fnal.gov

Synopsis:	Important: krb5 security update
Issue date:	2007-06-26
CVE Names:	CVE-2007-2442 CVE-2007-2443 CVE-2007-2798

David Coffey discovered an uninitialized pointer free flaw in the RPC
library used by kadmind.  On Scientific Linux 4 and 5, glibc
detects attempts to free invalid pointers.  A remote unauthenticated
attacker who can access kadmind could trigger this flaw and cause kadmind
to crash. (CVE-2007-2442)

David Coffey also discovered an overflow flaw in the RPC library used by
kadmind.  On Scientific Linux, exploitation of this flaw is limited
to a denial of service.  A remote unauthenticated attacker who can access
kadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)

A stack buffer overflow flaw was found in kadmind.  An authenticated
attacker who can access kadmind could trigger this flaw and potentially
execute arbitrary code on the Kerberos server. (CVE-2007-2798)

SL 4.x

   SRPMS:
	krb5-1.3.4-49.src.rpm
   i386:
	krb5-devel-1.3.4-49.i386.rpm
	krb5-libs-1.3.4-49.i386.rpm
	krb5-server-1.3.4-49.i386.rpm
	krb5-workstation-1.3.4-49.i386.rpm
   x86_64:
	krb5-devel-1.3.4-49.x86_64.rpm
	krb5-libs-1.3.4-49.i386.rpm
	krb5-libs-1.3.4-49.x86_64.rpm
	krb5-server-1.3.4-49.x86_64.rpm
	krb5-workstation-1.3.4-49.x86_64.rpm

SL 5.x

   SRPMS:
	krb5-1.5-26.src.rpm
   i386:
	krb5-devel-1.5-26.i386.rpm
	krb5-libs-1.5-26.i386.rpm
	krb5-server-1.5-26.i386.rpm
	krb5-workstation-1.5-26.i386.rpm
   x86_64:
	krb5-devel-1.5-26.i386.rpm
	krb5-devel-1.5-26.x86_64.rpm
	krb5-libs-1.5-26.i386.rpm
	krb5-libs-1.5-26.x86_64.rpm
	krb5-server-1.5-26.x86_64.rpm
	krb5-workstation-1.5-26.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2007-2442 krb5 SL5.x, SL4.x, SL3,x i386/x86_64

Important: krb5 security update

Summary

Date:         Wed, 27 Jun 2007 14:53:51 -0500Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for krb5 on SL5.x, SL4.x, SL3,x i386/x86_64Comments: To: scientific-linux-errata@fnal.govSynopsis:	Important: krb5 security updateIssue date:	2007-06-26CVE Names:	CVE-2007-2442 CVE-2007-2443 CVE-2007-2798David Coffey discovered an uninitialized pointer free flaw in the RPClibrary used by kadmind.  On Scientific Linux 4 and 5, glibcdetects attempts to free invalid pointers.  A remote unauthenticatedattacker who can access kadmind could trigger this flaw and cause kadmindto crash. (CVE-2007-2442)David Coffey also discovered an overflow flaw in the RPC library used bykadmind.  On Scientific Linux, exploitation of this flaw is limitedto a denial of service.  A remote unauthenticated attacker who can accesskadmind could trigger this flaw and cause kadmind to crash. (CVE-2007-2443)A stack buffer overflow flaw was found in kadmind.  An authenticatedattacker who can access kadmind could trigger this flaw and potentiallyexecute arbitrary code on the Kerberos server. (CVE-2007-2798)SL 4.x   SRPMS:	krb5-1.3.4-49.src.rpm   i386:	krb5-devel-1.3.4-49.i386.rpm	krb5-libs-1.3.4-49.i386.rpm	krb5-server-1.3.4-49.i386.rpm	krb5-workstation-1.3.4-49.i386.rpm   x86_64:	krb5-devel-1.3.4-49.x86_64.rpm	krb5-libs-1.3.4-49.i386.rpm	krb5-libs-1.3.4-49.x86_64.rpm	krb5-server-1.3.4-49.x86_64.rpm	krb5-workstation-1.3.4-49.x86_64.rpmSL 5.x   SRPMS:	krb5-1.5-26.src.rpm   i386:	krb5-devel-1.5-26.i386.rpm	krb5-libs-1.5-26.i386.rpm	krb5-server-1.5-26.i386.rpm	krb5-workstation-1.5-26.i386.rpm   x86_64:	krb5-devel-1.5-26.i386.rpm	krb5-devel-1.5-26.x86_64.rpm	krb5-libs-1.5-26.i386.rpm	krb5-libs-1.5-26.x86_64.rpm	krb5-server-1.5-26.x86_64.rpm	krb5-workstation-1.5-26.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News