GLSA 200405-23: Heimdal: Kerberos 4 buffer overflow in kadmin

Severity:high
Title:Heimdal: Kerberos 4 buffer overflow in kadmin
Date:05/27/2004
Bugs: #50208
ID:200405-23

Synopsis

A possible buffer overflow in the Kerberos 4 component of Heimdal has been discovered.

Background

Heimdal is a free implementation of Kerberos.

Affected packages

Package Vulnerable Unaffected Architecture(s)
app-crypt/heimdal < 0.6.2 >= 0.6.2 All supported architectures

Description

A buffer overflow was discovered in kadmind, a server for administrative access to the Kerberos database.

Impact

By sending a specially formatted message to kadmind, a remote attacker may be able to crash kadmind causing a denial of service, or execute arbitrary code with the permissions of the kadmind process.

Workaround

For a temporary workaround, providing you do not require Kerberos 4 support, you may turn off Kerberos 4 kadmin by running kadmind with the --no-kerberos4 option.

Resolution

All Heimdal users should upgrade to the latest stable version:

    # emerge sync

    # emerge -pv ">=app-crypt/heimdal-0.6.2"
    # emerge ">=app-crypt/heimdal-0.6.2"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200405-23.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!