|From:||rPath Update Announcements <firstname.lastname@example.org>|
|Subject:||rPSA-2007-0006-1 krb5 krb5-server krb5-services krb5-test krb5-workstation|
|Date:||Thu, 11 Jan 2007 13:48:23 -0500|
|Cc:||email@example.com, firstname.lastname@example.org, email@example.com|
rPath Security Advisory: 2007-0006-1 Published: 2007-01-11 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Remote Deterministic Denial of Service Updated Versions: krb5=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 krb5-server=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 krb5-services=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 krb5-test=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 krb5-workstation=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-200... http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-200... https://issues.rpath.com/browse/RPL-925 Description: Previous versions of the krb5 package are vulnerable to two types of attacks that are known to allow unauthenticated remote attackers to cause the kadmind process to crash. (One of these vulnerabilities involves executing code referenced by an uninitialized variable, and so may possibly enable more serious attacks, up to and including an unauthenticated remote root privilege escalation.)
Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds