Pufferüberlauf in krb5
ID: | RHSA-2005:330-01 |
Distribution: | Red Hat |
Plattformen: | Red Hat Enterprise Linux |
Datum: | Do, 31. März 2005, 13:00 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469 http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities http://www.idefense.com/application/poi/display?id=221&type=vulnerabilities |
Applikationen: | MIT Kerberos |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: krb5 security update Advisory ID: RHSA-2005:330-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-330.html Issue date: 2005-03-30 Updated on: 2005-03-30 Product: Red Hat Enterprise Linux Keywords: telnet CVE Names: CAN-2005-0468 CAN-2005-0469 --------------------------------------------------------------------- 1. Summary: Updated krb5 packages which fix two buffer overflow vulnerabilities in the included Kerberos-aware telnet client are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Kerberos is a networked authentication system which uses a trusted third party (a KDC) to authenticate clients and servers to each other. The krb5-workstation package includes a Kerberos-aware telnet client. Two buffer overflow flaws were discovered in the way the telnet client handles messages from a server. An attacker may be able to execute arbitrary code on a victim's machine if the victim can be tricked into connecting to a malicious telnet server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2005-0468 and CAN-2005-0469 to these issues. Users of krb5 should update to these erratum packages which contain a backported patch to correct this issue. Red Hat would like to thank iDEFENSE for their responsible disclosure of this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 151267 - 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/krb5-1.2.2-34.src.rpm d76d469166a335ebdbd60c201280114e krb5-1.2.2-34.src.rpm i386: 5a864d57b0e04534006b809215e5b2a1 krb5-devel-1.2.2-34.i386.rpm 2353b8f37263fbe2b3a36659517760fc krb5-libs-1.2.2-34.i386.rpm 605b4b5ffd2a3ee6c05350aaf9d16004 krb5-server-1.2.2-34.i386.rpm d5a304cd4a4f0769630255072ee9c763 krb5-workstation-1.2.2-34.i386.rpm ia64: 8befb0ccf160d23932a924acfb6b3072 krb5-devel-1.2.2-34.ia64.rpm 95b7c9b2048548fbfe1750c4d72a23b7 krb5-libs-1.2.2-34.ia64.rpm 26f1bdaccc93e24e833a2d5f20bbfa09 krb5-server-1.2.2-34.ia64.rpm d98001ff0bb393830e5269e203f3ca48 krb5-workstation-1.2.2-34.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/krb5-1.2.2-34.src.rpm d76d469166a335ebdbd60c201280114e krb5-1.2.2-34.src.rpm ia64: 8befb0ccf160d23932a924acfb6b3072 krb5-devel-1.2.2-34.ia64.rpm 95b7c9b2048548fbfe1750c4d72a23b7 krb5-libs-1.2.2-34.ia64.rpm 26f1bdaccc93e24e833a2d5f20bbfa09 krb5-server-1.2.2-34.ia64.rpm d98001ff0bb393830e5269e203f3ca48 krb5-workstation-1.2.2-34.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/krb5-1.2.2-34.src.rpm d76d469166a335ebdbd60c201280114e krb5-1.2.2-34.src.rpm i386: 5a864d57b0e04534006b809215e5b2a1 krb5-devel-1.2.2-34.i386.rpm 2353b8f37263fbe2b3a36659517760fc krb5-libs-1.2.2-34.i386.rpm 605b4b5ffd2a3ee6c05350aaf9d16004 krb5-server-1.2.2-34.i386.rpm d5a304cd4a4f0769630255072ee9c763 krb5-workstation-1.2.2-34.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/krb5-1.2.2-34.src.rpm d76d469166a335ebdbd60c201280114e krb5-1.2.2-34.src.rpm i386: 5a864d57b0e04534006b809215e5b2a1 krb5-devel-1.2.2-34.i386.rpm 2353b8f37263fbe2b3a36659517760fc krb5-libs-1.2.2-34.i386.rpm 605b4b5ffd2a3ee6c05350aaf9d16004 krb5-server-1.2.2-34.i386.rpm d5a304cd4a4f0769630255072ee9c763 krb5-workstation-1.2.2-34.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/krb5-1.2.7-42.src.rpm 15e292d791e6cd5a788764374c32769e krb5-1.2.7-42.src.rpm i386: 8d2d653de75e0e90d9718043bb9ec2ea krb5-devel-1.2.7-42.i386.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm 76a8c1d4048606e96b763b1cfd9e2862 krb5-server-1.2.7-42.i386.rpm 02d15698839a4dca13a692567fdc3701 krb5-workstation-1.2.7-42.i386.rpm ia64: d9486bd1ba6bf58fff0c33b8b54e10d1 krb5-devel-1.2.7-42.ia64.rpm b8f7a412868eb4331b2ac371f2935bed krb5-libs-1.2.7-42.ia64.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm e4f4267d02ac27da8963c4770c2d6ab7 krb5-server-1.2.7-42.ia64.rpm a0eb9ccceccb1d777331ab1098ce24b8 krb5-workstation-1.2.7-42.ia64.rpm ppc: 2bfc18ea2b64f042e96f6a7aa3ec769b krb5-devel-1.2.7-42.ppc.rpm 62e0c55d9ee03b661c90689f4c663fa9 krb5-libs-1.2.7-42.ppc.rpm 0001f467b217ae55c103a9f8d8bbe0c4 krb5-libs-1.2.7-42.ppc64.rpm 4ae29ca81df4a7323f4a04dfe7bf422e krb5-server-1.2.7-42.ppc.rpm c28434eb04aa8ba62ae98f384ae96d66 krb5-workstation-1.2.7-42.ppc.rpm s390: 018b6ff9a07097653d1fb0083a8654eb krb5-devel-1.2.7-42.s390.rpm 9c2251b0c061abcec03805bf668654fa krb5-libs-1.2.7-42.s390.rpm e35388af17b751685a02b35be76c83eb krb5-server-1.2.7-42.s390.rpm f8336a07b5429d1c48592dbe9e8b638a krb5-workstation-1.2.7-42.s390.rpm s390x: fc291f78e9ae09ab0500eb772e364b57 krb5-devel-1.2.7-42.s390x.rpm ace1cd33911c12d87ee4616eea5f97d6 krb5-libs-1.2.7-42.s390x.rpm 9c2251b0c061abcec03805bf668654fa krb5-libs-1.2.7-42.s390.rpm b344cc43c163bb08a5b691dcbee69d10 krb5-server-1.2.7-42.s390x.rpm 947cfc0608f6bed2c325d5113188391e krb5-workstation-1.2.7-42.s390x.rpm x86_64: c8f33f385c8b59f8088ba3938820f466 krb5-devel-1.2.7-42.x86_64.rpm 2d13ed5aad4c7910373cfd7399780e18 krb5-libs-1.2.7-42.x86_64.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm 55efe49040a64af9f4368e1e6c02c758 krb5-server-1.2.7-42.x86_64.rpm a00c82982864a159076c9f7548675ad9 krb5-workstation-1.2.7-42.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/krb5-1.2.7-42.src.rpm 15e292d791e6cd5a788764374c32769e krb5-1.2.7-42.src.rpm i386: 8d2d653de75e0e90d9718043bb9ec2ea krb5-devel-1.2.7-42.i386.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm 02d15698839a4dca13a692567fdc3701 krb5-workstation-1.2.7-42.i386.rpm x86_64: c8f33f385c8b59f8088ba3938820f466 krb5-devel-1.2.7-42.x86_64.rpm 2d13ed5aad4c7910373cfd7399780e18 krb5-libs-1.2.7-42.x86_64.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm a00c82982864a159076c9f7548675ad9 krb5-workstation-1.2.7-42.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/krb5-1.2.7-42.src.rpm 15e292d791e6cd5a788764374c32769e krb5-1.2.7-42.src.rpm i386: 8d2d653de75e0e90d9718043bb9ec2ea krb5-devel-1.2.7-42.i386.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm 76a8c1d4048606e96b763b1cfd9e2862 krb5-server-1.2.7-42.i386.rpm 02d15698839a4dca13a692567fdc3701 krb5-workstation-1.2.7-42.i386.rpm ia64: d9486bd1ba6bf58fff0c33b8b54e10d1 krb5-devel-1.2.7-42.ia64.rpm b8f7a412868eb4331b2ac371f2935bed krb5-libs-1.2.7-42.ia64.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm e4f4267d02ac27da8963c4770c2d6ab7 krb5-server-1.2.7-42.ia64.rpm a0eb9ccceccb1d777331ab1098ce24b8 krb5-workstation-1.2.7-42.ia64.rpm x86_64: c8f33f385c8b59f8088ba3938820f466 krb5-devel-1.2.7-42.x86_64.rpm 2d13ed5aad4c7910373cfd7399780e18 krb5-libs-1.2.7-42.x86_64.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm 55efe49040a64af9f4368e1e6c02c758 krb5-server-1.2.7-42.x86_64.rpm a00c82982864a159076c9f7548675ad9 krb5-workstation-1.2.7-42.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/krb5-1.2.7-42.src.rpm 15e292d791e6cd5a788764374c32769e krb5-1.2.7-42.src.rpm i386: 8d2d653de75e0e90d9718043bb9ec2ea krb5-devel-1.2.7-42.i386.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm 02d15698839a4dca13a692567fdc3701 krb5-workstation-1.2.7-42.i386.rpm ia64: d9486bd1ba6bf58fff0c33b8b54e10d1 krb5-devel-1.2.7-42.ia64.rpm b8f7a412868eb4331b2ac371f2935bed krb5-libs-1.2.7-42.ia64.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm a0eb9ccceccb1d777331ab1098ce24b8 krb5-workstation-1.2.7-42.ia64.rpm x86_64: c8f33f385c8b59f8088ba3938820f466 krb5-devel-1.2.7-42.x86_64.rpm 2d13ed5aad4c7910373cfd7399780e18 krb5-libs-1.2.7-42.x86_64.rpm 3f7f0d23cc9447241d17bf92aac52376 krb5-libs-1.2.7-42.i386.rpm a00c82982864a159076c9f7548675ad9 krb5-workstation-1.2.7-42.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/krb5-1.3.4-12.src.rpm 8d598c4fa4404470d6e45978aa47ba6b krb5-1.3.4-12.src.rpm i386: 68457cc2117214ab9b11405b964275db krb5-devel-1.3.4-12.i386.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm dab0e8a818d3df2b028b3c39ba4daa52 krb5-server-1.3.4-12.i386.rpm a12db77933dc920943d6316f7e470ccc krb5-workstation-1.3.4-12.i386.rpm ia64: 1e9eef4e781b54fe954442a427e4fdbe krb5-devel-1.3.4-12.ia64.rpm 56686098f08e0b62bd1445977f7eba6d krb5-libs-1.3.4-12.ia64.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm ebce3644ac1704157552d51b6a244565 krb5-server-1.3.4-12.ia64.rpm 67c5b06a01aa25b361926bca1c055c03 krb5-workstation-1.3.4-12.ia64.rpm ppc: 261644c24300998a25c57d513fe08c6e krb5-devel-1.3.4-12.ppc.rpm b9663d67bb9b97657d41d870f63b276e krb5-libs-1.3.4-12.ppc.rpm 7248e6793d04613a952422f828fe2cb7 krb5-libs-1.3.4-12.ppc64.rpm 2ea50dcbeb0124a71c1e3489fec583fa krb5-server-1.3.4-12.ppc.rpm 40e4b837e731816630f653bc98e22530 krb5-workstation-1.3.4-12.ppc.rpm s390: 9f759fb193a998a4f88a21ca77f0b1ab krb5-devel-1.3.4-12.s390.rpm cd50ea2c90966a8527e06d77b6c47913 krb5-libs-1.3.4-12.s390.rpm 99668163d062fb8f5bfad4654f444313 krb5-server-1.3.4-12.s390.rpm d94e6fabfc7fd33c9208ce7d374c89e8 krb5-workstation-1.3.4-12.s390.rpm s390x: 5aa3854179039c6cb73145084123a197 krb5-devel-1.3.4-12.s390x.rpm 968f3babf2058bc88b44c5907f029017 krb5-libs-1.3.4-12.s390x.rpm cd50ea2c90966a8527e06d77b6c47913 krb5-libs-1.3.4-12.s390.rpm 7d191831a79c60f99b03c441ca771428 krb5-server-1.3.4-12.s390x.rpm 130b64761b996f24a57ffeb85e637002 krb5-workstation-1.3.4-12.s390x.rpm x86_64: bcf94a851223872e8fcd272a297dc3c2 krb5-devel-1.3.4-12.x86_64.rpm ef7f66e2a911b6c9787ab2e0b87534fc krb5-libs-1.3.4-12.x86_64.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm ee69869e21701b21cb73092d43e49009 krb5-server-1.3.4-12.x86_64.rpm 2edb7a1bfd9e102ace52fe8e90f84e6c krb5-workstation-1.3.4-12.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/krb5-1.3.4-12.src.rpm 8d598c4fa4404470d6e45978aa47ba6b krb5-1.3.4-12.src.rpm i386: 68457cc2117214ab9b11405b964275db krb5-devel-1.3.4-12.i386.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm dab0e8a818d3df2b028b3c39ba4daa52 krb5-server-1.3.4-12.i386.rpm a12db77933dc920943d6316f7e470ccc krb5-workstation-1.3.4-12.i386.rpm x86_64: bcf94a851223872e8fcd272a297dc3c2 krb5-devel-1.3.4-12.x86_64.rpm ef7f66e2a911b6c9787ab2e0b87534fc krb5-libs-1.3.4-12.x86_64.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm ee69869e21701b21cb73092d43e49009 krb5-server-1.3.4-12.x86_64.rpm 2edb7a1bfd9e102ace52fe8e90f84e6c krb5-workstation-1.3.4-12.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/krb5-1.3.4-12.src.rpm 8d598c4fa4404470d6e45978aa47ba6b krb5-1.3.4-12.src.rpm i386: 68457cc2117214ab9b11405b964275db krb5-devel-1.3.4-12.i386.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm dab0e8a818d3df2b028b3c39ba4daa52 krb5-server-1.3.4-12.i386.rpm a12db77933dc920943d6316f7e470ccc krb5-workstation-1.3.4-12.i386.rpm ia64: 1e9eef4e781b54fe954442a427e4fdbe krb5-devel-1.3.4-12.ia64.rpm 56686098f08e0b62bd1445977f7eba6d krb5-libs-1.3.4-12.ia64.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm ebce3644ac1704157552d51b6a244565 krb5-server-1.3.4-12.ia64.rpm 67c5b06a01aa25b361926bca1c055c03 krb5-workstation-1.3.4-12.ia64.rpm x86_64: bcf94a851223872e8fcd272a297dc3c2 krb5-devel-1.3.4-12.x86_64.rpm ef7f66e2a911b6c9787ab2e0b87534fc krb5-libs-1.3.4-12.x86_64.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm ee69869e21701b21cb73092d43e49009 krb5-server-1.3.4-12.x86_64.rpm 2edb7a1bfd9e102ace52fe8e90f84e6c krb5-workstation-1.3.4-12.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/krb5-1.3.4-12.src.rpm 8d598c4fa4404470d6e45978aa47ba6b krb5-1.3.4-12.src.rpm i386: 68457cc2117214ab9b11405b964275db krb5-devel-1.3.4-12.i386.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm dab0e8a818d3df2b028b3c39ba4daa52 krb5-server-1.3.4-12.i386.rpm a12db77933dc920943d6316f7e470ccc krb5-workstation-1.3.4-12.i386.rpm ia64: 1e9eef4e781b54fe954442a427e4fdbe krb5-devel-1.3.4-12.ia64.rpm 56686098f08e0b62bd1445977f7eba6d krb5-libs-1.3.4-12.ia64.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm ebce3644ac1704157552d51b6a244565 krb5-server-1.3.4-12.ia64.rpm 67c5b06a01aa25b361926bca1c055c03 krb5-workstation-1.3.4-12.ia64.rpm x86_64: bcf94a851223872e8fcd272a297dc3c2 krb5-devel-1.3.4-12.x86_64.rpm ef7f66e2a911b6c9787ab2e0b87534fc krb5-libs-1.3.4-12.x86_64.rpm 5ee63ae61d91fab567dedb7880fa648e krb5-libs-1.3.4-12.i386.rpm ee69869e21701b21cb73092d43e49009 krb5-server-1.3.4-12.x86_64.rpm 2edb7a1bfd9e102ace52fe8e90f84e6c krb5-workstation-1.3.4-12.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities http://www.idefense.com/application/poi/display?id=221&type=vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469 8. Contact: The Red Hat security contact is |