exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-071

Mandriva Linux Security Advisory 2008-071
Posted Mar 19, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A Kerberos v4 protocol packet handling issue relating to krb5 has been addressed in this advisory.

tags | advisory, protocol
systems | linux, mandriva
advisories | CVE-2008-0062, CVE-2008-0063
SHA-256 | d0d2d944f37fbb2dbfe27231c0f06ae886e00dccec1c69b4b521628db6b650f4

Mandriva Linux Security Advisory 2008-071

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:071
http://www.mandriva.com/security/
_______________________________________________________________________

Package : krb5
Date : March 19, 2008
Affected: Corporate 3.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

A flaw was discovered in how the Kerberos krb5kdc handled Kerberos v4
protocol packets. An unauthenticated remote attacker could use this
flaw to crash the krb5kdc daemon, disclose portions of its memory,
or possibly %execute arbitrary code using malformed or truncated
Kerberos v4 protocol requests (CVE-2008-0062, CVE-2008-0063).

This issue only affects krb5kdc when it has Kerberos v4 protocol
compatibility enabled, which is a compiled-in default in all
Kerberos versions that Mandriva Linux ships prior to Mandriva
Linux 2008.0. Kerberos v4 protocol support can be disabled by
adding v4_mode=none (without quotes) to the [kdcdefaults] section
of /etc/kerberos/krb5kdc/kdc.conf.

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt
_______________________________________________________________________

Updated Packages:

Corporate 3.0:
d671c7e0f68642556b1ba5a33d26eaf8 corporate/3.0/i586/ftp-client-krb5-1.3-6.10.C30mdk.i586.rpm
9e5a2591cee10ed62948f6d30e836863 corporate/3.0/i586/ftp-server-krb5-1.3-6.10.C30mdk.i586.rpm
7e8fc318772ff7dcd22f5b1c81bbfe6d corporate/3.0/i586/krb5-server-1.3-6.10.C30mdk.i586.rpm
45838af9454ffc5f6c06a505b4468c83 corporate/3.0/i586/krb5-workstation-1.3-6.10.C30mdk.i586.rpm
fbdb6f71d9e2a939bbea33312b74c998 corporate/3.0/i586/libkrb51-1.3-6.10.C30mdk.i586.rpm
50f964ee10fc744553a862c918913b03 corporate/3.0/i586/libkrb51-devel-1.3-6.10.C30mdk.i586.rpm
667270f39306bd837b08b310a189f75d corporate/3.0/i586/telnet-client-krb5-1.3-6.10.C30mdk.i586.rpm
a5a4a1a64c14164e1755ad37e35cf99d corporate/3.0/i586/telnet-server-krb5-1.3-6.10.C30mdk.i586.rpm
07535be43a1e339a0ba69cc167fbb530 corporate/3.0/SRPMS/krb5-1.3-6.10.C30mdk.src.rpm

Corporate 3.0/X86_64:
0f693533eea0d49c60b20c40e6b5a872 corporate/3.0/x86_64/ftp-client-krb5-1.3-6.10.C30mdk.x86_64.rpm
061429249b1cc62647c3a95d6b2a3d8b corporate/3.0/x86_64/ftp-server-krb5-1.3-6.10.C30mdk.x86_64.rpm
bda82007dd59af28240d51ca020370d1 corporate/3.0/x86_64/krb5-server-1.3-6.10.C30mdk.x86_64.rpm
9d7e810eacfc17774ee33a438cdc196d corporate/3.0/x86_64/krb5-workstation-1.3-6.10.C30mdk.x86_64.rpm
b4abcda997c06b142bbae27cf3e617ef corporate/3.0/x86_64/lib64krb51-1.3-6.10.C30mdk.x86_64.rpm
e3692fe347ec21c7fd25a581ef817d66 corporate/3.0/x86_64/lib64krb51-devel-1.3-6.10.C30mdk.x86_64.rpm
c5da9da1f3aa15a0966f8d1644748340 corporate/3.0/x86_64/telnet-client-krb5-1.3-6.10.C30mdk.x86_64.rpm
fd9ff563b0d3d58705eb3b2b4aeebc11 corporate/3.0/x86_64/telnet-server-krb5-1.3-6.10.C30mdk.x86_64.rpm
07535be43a1e339a0ba69cc167fbb530 corporate/3.0/SRPMS/krb5-1.3-6.10.C30mdk.src.rpm

Multi Network Firewall 2.0:
fa4c3506c056e55862b4db41e134db1c mnf/2.0/i586/libkrb51-1.3-6.10.M20mdk.i586.rpm
5c5caff1487f3284ba0c9529a831405e mnf/2.0/SRPMS/krb5-1.3-6.10.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFH4WQ2mqjQ0CJFipgRAme0AJ9fNnZituwkl8Yx1PIECEds/A5s0QCg1ETW
G9i9EWrOhEC/prfZ6UhjyX8=
=RDH6
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close