drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in apache-mod_auth_kerb
Name: |
Denial of Service in apache-mod_auth_kerb |
|
ID: |
MDKSA-2006:218 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva Corporate 4.0 |
|
Datum: |
Do, 23. November 2006, 22:43 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989 |
|
Applikationen: |
apache-mod_auth_kerb |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1164318208-16192-2898
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2006:218 http://www.mandriva.com/security/ _______________________________________________________________________ Package : apache-mod_auth_kerb Date : November 23, 2006 Affected: Corporate 4.0 _______________________________________________________________________ Problem Description: An off-by-one error in the der_get_oid function in mod_auth_kerb 5.0 allows remote attackers to cause a denial of service (crash) via a crafted Kerberos message that triggers a heap-based buffer overflow in the component array.
Packages have been patched to correct this issue. _______________________________________________________________________
References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989 _______________________________________________________________________ Updated Packages: Corporate 4.0: 8ce7379b083881bad524a8f2c0f14e26 corporate/4.0/i586/apache-mod_auth_kerb-5.0-2.1.20060mlcs4.i586.rpm 7b3c02468f28a21609fa86c53af50951 corporate/4.0/SRPMS/apache-mod_auth_kerb-5.0-2.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 0200c4ac02a6217d22edc05c74db3378 corporate/4.0/x86_64/apache-mod_auth_kerb-5.0-2.1.20060mlcs4.x86_64.rpm 7b3c02468f28a21609fa86c53af50951 corporate/4.0/SRPMS/apache-mod_auth_kerb-5.0-2.1.20060mlcs4.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFFZcQDmqjQ0CJFipgRAhX1AJsGMqVdXHk2R2Xryz8HWQD9lHuRjgCgu771 rnLhKqiTqIobFMja1JPTDt4= =FqH0 -----END PGP SIGNATURE-----
------------=_1164318208-16192-2898 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________
------------=_1164318208-16192-2898--
|
|
|
|