what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-098

Mandriva Linux Security Advisory 2009-098
Posted Dec 8, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-098 - Multiple vulnerabilities has been found and corrected in krb5. The updated packages have been patched to correct these issues. Packages for 2008.0 are being provided due to extended support for Corporate products.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-0844, CVE-2009-0845, CVE-2009-0846, CVE-2009-0847
SHA-256 | 2bb2bf931d6ac2e4ccaf6f044d6d84fb55c9289bdf7e1e03c8e0a43d4dd4c549

Mandriva Linux Security Advisory 2009-098

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:098-1
http://www.mandriva.com/security/
_______________________________________________________________________

Package : krb5
Date : December 8, 2009
Affected: 2008.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been found and corrected in krb5:

The get_input_token function in the SPNEGO implementation in MIT
Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to
cause a denial of service (daemon crash) and possibly obtain sensitive
information via a crafted length value that triggers a buffer over-read
(CVE-2009-0844).

The spnego_gss_accept_sec_context function in
lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5
through 1.6.3, when SPNEGO is used, allows remote attackers to cause
a denial of service (NULL pointer dereference and daemon crash) via
invalid ContextFlags data in the reqFlags field in a negTokenInit token
(CVE-2009-0845).

The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in
the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before
1.6.4 allows remote attackers to cause a denial of service (daemon
crash) or possibly execute arbitrary code via vectors involving an
invalid DER encoding that triggers a free of an uninitialized pointer
(CVE-2009-0846).

The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5
(aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to
cause a denial of service (application crash) via a crafted length
value that triggers an erroneous malloc call, related to incorrect
calculations with pointer arithmetic (CVE-2009-0847).

The updated packages have been patched to correct these issues.

Update:

Packages for 2008.0 are being provided due to extended support for
Corporate products.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
76c92a66601230990ff6281c42067749 2008.0/i586/ftp-client-krb5-1.6.2-7.3mdv2008.0.i586.rpm
218e4da0c92e594074dc3fbcd27cb3d7 2008.0/i586/ftp-server-krb5-1.6.2-7.3mdv2008.0.i586.rpm
1051b34f188f5a2606d9ab8a1f126670 2008.0/i586/krb5-1.6.2-7.3mdv2008.0.i586.rpm
c221a8252b9fd218a813c6a0bff93d6f 2008.0/i586/krb5-server-1.6.2-7.3mdv2008.0.i586.rpm
7a247e309408dd0b71359f39caf1b7f6 2008.0/i586/krb5-workstation-1.6.2-7.3mdv2008.0.i586.rpm
a97f9c43d1eefab82742884db15d5bbc 2008.0/i586/libkrb53-1.6.2-7.3mdv2008.0.i586.rpm
27dd46df53ff045324a034d0ca82d49c 2008.0/i586/libkrb53-devel-1.6.2-7.3mdv2008.0.i586.rpm
431452767e975eb64cc6cd247063d37c 2008.0/i586/telnet-client-krb5-1.6.2-7.3mdv2008.0.i586.rpm
aaba3becaf596303a3c13971791c2754 2008.0/i586/telnet-server-krb5-1.6.2-7.3mdv2008.0.i586.rpm
53c1386ea4b5df817c291036c0b87c87 2008.0/SRPMS/krb5-1.6.2-7.3mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
e2f5fe97c5378b7289f82e91bdd6bddd 2008.0/x86_64/ftp-client-krb5-1.6.2-7.3mdv2008.0.x86_64.rpm
a08df3ac4dca4acdf206319a3719fbdd 2008.0/x86_64/ftp-server-krb5-1.6.2-7.3mdv2008.0.x86_64.rpm
885d1a0531dfb0cf76caa7c4ff3fe18e 2008.0/x86_64/krb5-1.6.2-7.3mdv2008.0.x86_64.rpm
039ee08d160d7e69d08bada9094b97a3 2008.0/x86_64/krb5-server-1.6.2-7.3mdv2008.0.x86_64.rpm
9b38bbdf14e5497210fc089f557e95e1 2008.0/x86_64/krb5-workstation-1.6.2-7.3mdv2008.0.x86_64.rpm
a0c7e0644a2003de2c0b9c9950732aa4 2008.0/x86_64/lib64krb53-1.6.2-7.3mdv2008.0.x86_64.rpm
5ba2c89f29763d83566c6fef282b739b 2008.0/x86_64/lib64krb53-devel-1.6.2-7.3mdv2008.0.x86_64.rpm
ecda67b1be41c463bef90354ded0915f 2008.0/x86_64/telnet-client-krb5-1.6.2-7.3mdv2008.0.x86_64.rpm
500a7f81e1be11f4b5100f231035e819 2008.0/x86_64/telnet-server-krb5-1.6.2-7.3mdv2008.0.x86_64.rpm
53c1386ea4b5df817c291036c0b87c87 2008.0/SRPMS/krb5-1.6.2-7.3mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLHneQmqjQ0CJFipgRAiufAJ4+LNorMYEk9enGwlPtLnnzjMc8zACbBCW1
V+QcAY7lO0qyPBjOe2tWP10=
=kA3r
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close