exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netbsd.2000-017.libkrb

netbsd.2000-017.libkrb
Posted Dec 22, 2000

NetBSD Security Advisory 2000-017 - Kerberised telnetd and libkrb contain exploitable local root bugs. There were two problems - first, telnetd allowed the user to provide arbitrary environment variables, including several that cause programs to behave differently. There was also a possible buffer overflow in the Kerberos v4 library.

tags | overflow, arbitrary, local, root
systems | netbsd
SHA-256 | e2ca278f746dd9a252a1141d30648c61f4059f12835a666a65c72466f7ff53b7

netbsd.2000-017.libkrb

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2000-017
=================================

Topic: Exploitable bugs in kerberised telnetd and libkrb
Version: 1.5
Severity: local root compromise possible
Fixed: 2000/12/09 in -current; 2000/12/15 in netbsd-1-5-branch

Abstract
========

The combination of a too liberal implementation in telnetd and bugs in
libkrb combines to make it possible for authorized users of a system
to obtain root access on a system.

Technical Details
=================

there were two problems; first, telnetd allowed the user to provide
arbitrary environment variables, including several that cause programs
to behave differently. There was also a possible buffer overflow in
the kerberos v4 library.

Solutions and Workarounds
=========================

The problem was fixed in NetBSD-current on 2000/12/09; systems running
NetBSD-current dated from before that date should be upgraded to
NetBSD-current dated 2000/12/09 or later. The 1.5 branch was
fixed by 2000/12/15.

Systems running 1.4.x are not vulnerable to this problem as they do
not contain this version of kerberos.

Systems running 1.5 should apply the patch found in
ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/patches/20001220-krb
and then rebuild and reinstall both the "libkrb" library and telnetd.

Systems running NetBSD-current dated from before 2000/12/09 should be
upgraded to NetBSD-current dated 2000/12/09 or later.

Thanks To
=========

Jouko Pynnönen <jouko@solutions.fi>

Revision History
================

20001215 First draft

More Information
================

Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/.


Copyright 2000, The NetBSD Foundation, Inc. All Rights Reserved.

$NetBSD: NetBSD-SA2000-017.txt,v 1.5 2000/12/20 20:30:13 sommerfeld Exp $

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBOkEW3j5Ru2/4N2IFAQHOmwP8D/+PSPdMwwo4G22IX2820iRitmUBU7c/
moB6TaEw9CPMzAmd3499Kx/Xe+IRMFEFgDZOJVDZx/tgqWR2Xpd/caQiAM/9c0Th
uVRW/A5EgSm7mUnUk82KHnySpqKn+Cnr1ytR9a+HuaSpn0O/Q0yHslg95G+VYQ2W
f31W26+Q21M=
=hboe
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close