Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in krb5 (Fedora Core 2)
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in krb5 (Fedora Core 2)
ID: FEDORA-2005-269
Distribution: Fedora
Plattformen: Fedora Core 2
Datum: Di, 29. März 2005, 13:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469
Applikationen: MIT Kerberos

Originalnachricht

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2005-269
2005-03-29
---------------------------------------------------------------------

Product : Fedora Core 2
Name : krb5
Version : 1.3.6
Release : 4
Summary : The Kerberos network authentication system.
Description :
Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of cleartext passwords.

---------------------------------------------------------------------
Update Information:

Updated krb5 packages which fix two buffer overflow vulnerabilities
in the included Kerberos-aware telnet client are now available.

Kerberos is a networked authentication system which uses a trusted
third party (a KDC) to authenticate clients and servers to each
other.

The krb5-workstation package includes a Kerberos-aware telnet client.
Two buffer overflow flaws were discovered in the way the telnet
client handles messages from a server. An attacker may be able to
execute arbitrary code on a victim's machine if the victim can be
tricked into connecting to a malicious telnet server. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the names CAN-2005-0468 and CAN-2005-0469 to these issues.
---------------------------------------------------------------------
* Wed Mar 23 2005 Nalin Dahyabhai <nalin@redhat.com> 1.3.6-4

- drop krshd patch

* Thu Mar 17 2005 Nalin Dahyabhai <nalin@redhat.com>

- add draft fix from Tom Yu for slc_add_reply() buffer overflow (CAN-2005-0469)
- add draft fix from Tom Yu for env_opt_add() buffer overflow (CAN-2005-0468)
---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

3c210dbdcfb5f01a35f52632abbd3e58 SRPMS/krb5-1.3.6-4.src.rpm
2b4e4f7ffe208989572b173efa18c4b4 x86_64/krb5-devel-1.3.6-4.x86_64.rpm
67a3ffb77c8f92b235d503380ff54b32 x86_64/krb5-libs-1.3.6-4.x86_64.rpm
5d8e752002f27ca2ea7c8f40a6247b37 x86_64/krb5-server-1.3.6-4.x86_64.rpm
b01504865b91a46e9f6dab345a939bf6 x86_64/krb5-workstation-1.3.6-4.x86_64.rpm
72def6a5e69a30e63ab071f581ad1729
x86_64/debug/krb5-debuginfo-1.3.6-4.x86_64.rpm
891e77b16aa127543976583a0b134464 x86_64/krb5-libs-1.3.6-4.i386.rpm
e26b5c97144daa666babf9e01bc90b25 i386/krb5-devel-1.3.6-4.i386.rpm
891e77b16aa127543976583a0b134464 i386/krb5-libs-1.3.6-4.i386.rpm
16a523103910c903de48a8c2e33c6524 i386/krb5-server-1.3.6-4.i386.rpm
f36537a81b6330e72c01de759196fb35 i386/krb5-workstation-1.3.6-4.i386.rpm
123d9371167ecbe81399b256ece22399 i386/debug/krb5-debuginfo-1.3.6-4.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.
---------------------------------------------------------------------



--
fedora-announce-list mailing list
fedora-announce-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-announce-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung