klieber Bodhisattva
Joined: 17 Apr 2002 Posts: 3657 Location: San Francisco, CA
|
Posted: Mon Oct 28, 2002 2:38 pm Post subject: [gentoo-announce] GLSA: krb5 |
|
|
Daniel Ahlberg wrote: | - - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-011
- - --------------------------------------------------------------------
PACKAGE : krb5
SUMMARY\240: buffer overflow
DATE \240\240 : 2002-10-28 14:10 UTC
EXPLOIT : remote
- - --------------------------------------------------------------------
A stack buffer overflow in the implementation of the Kerberos v4 compatibility administration daemon (kadmind4) in the MIT krb5 distribution can be exploited to gain unauthorized root access to a KDC host. The attacker does not need to authenticate to the daemon to successfully perform this attack. At least one exploit is known to exist in the wild, and at least one attacker is reasonably competent at cleaning up traces of intrusion.
Read the full advisory at
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt
SOLUTION
It is recommended that all Gentoo Linux users who are running app-crypt/krb5 and earlier update their systems as follows:
emerge rsync
emerge krb5
emerge clean
- - --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
- - -------------------------------------------------------------------- |
Mailing List Archive: http://lists.gentoo.org/pipermail/gentoo-announce/2002-October/000229.html
--kurt _________________ The problem with political jokes is that they get elected |
|