User: Password:
|
|
Subscribe / Log in / New account

rPath alert rPSA-2007-0006-1 (krb5)

From:  rPath Update Announcements <announce-noreply@rpath.com>
To:  security-announce@lists.rpath.com, update-announce@lists.rpath.com
Subject:  rPSA-2007-0006-1 krb5 krb5-server krb5-services krb5-test krb5-workstation
Date:  Thu, 11 Jan 2007 13:48:23 -0500
Cc:  full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com, lwn@lwn.net

rPath Security Advisory: 2007-0006-1 Published: 2007-01-11 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Remote Deterministic Denial of Service Updated Versions: krb5=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 krb5-server=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 krb5-services=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 krb5-test=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 krb5-workstation=/conary.rpath.com@rpl:devel//1/1.4.1-7.5-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-200... http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-200... https://issues.rpath.com/browse/RPL-925 Description: Previous versions of the krb5 package are vulnerable to two types of attacks that are known to allow unauthenticated remote attackers to cause the kadmind process to crash. (One of these vulnerabilities involves executing code referenced by an uninitialized variable, and so may possibly enable more serious attacks, up to and including an unauthenticated remote root privilege escalation.)


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds