Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandrake: krb5 heap overflow Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
Mandrake The implemenation of Kerberos 5 contains an RPC library which is vulnerable to a heap overflow. With Kerberos, it is believed that an attacker would need to be able to successfully authenticate to kadmin to be able to exploit this vulnerability.


                Mandrake Linux Security Update Advisory

Package name:           krb5
Advisory ID:            MDKSA-2002:057
Date:                   September 9th, 2002
Affected versions:      8.1, 8.2

Problem Description:

 The network authentication system in Kerberos 5 contains an RPC library
 that includes an XDR decoder derived from Sun's RPC implementation.
 This implemenation is vulnerable to a heap overflow.  With Kerberos,
 it is believed that an attacker would need to be able to successfully
 authenticate to kadmin to be able to exploit this vulnerability.


Updated Packages:

 Mandrake Linux 8.1:
 89e66916a850ffe924c7dcd896e2fbc3  8.1/RPMS/ftp-client-krb5-1.2.2-17.1mdk.i586.rpm
 c4967bdfafe9f402e97f8db37750b5c5  8.1/RPMS/ftp-server-krb5-1.2.2-17.1mdk.i586.rpm
 aeec53f49f42abf9679da02c6558cfed  8.1/RPMS/krb5-devel-1.2.2-17.1mdk.i586.rpm
 753a2b894ce2cade9116294a706e3de7  8.1/RPMS/krb5-libs-1.2.2-17.1mdk.i586.rpm
 70d82681539fb46e815b8ca9b66f8656  8.1/RPMS/krb5-server-1.2.2-17.1mdk.i586.rpm
 19cb8b5f1d511abf297ac0aebcca4ce1  8.1/RPMS/krb5-workstation-1.2.2-17.1mdk.i586.rpm
 17ab08b6b6358a02ef814991fae72a5c  8.1/RPMS/telnet-client-krb5-1.2.2-17.1mdk.i586.rpm
 b6026fe8d7dcd94c0e8ea4b539ff2d08  8.1/RPMS/telnet-server-krb5-1.2.2-17.1mdk.i586.rpm
 c8352cab7f15b40165c262eb7452ee47  8.1/SRPMS/krb5-1.2.2-17.1mdk.src.rpm
 Mandrake Linux 8.1/ia64:
 333f7dcd012ed1d740264945889e2439  ia64/8.1/RPMS/ftp-client-krb5-1.2.2-17.1mdk.ia64.rpm
 a20ecef9980051418ca05221da8659c8  ia64/8.1/RPMS/ftp-server-krb5-1.2.2-17.1mdk.ia64.rpm
 e4da47ab657c2d0c205b8cfd904061e4  ia64/8.1/RPMS/krb5-devel-1.2.2-17.1mdk.ia64.rpm
 916451d1f6da5a35a1f46f43dfc3f203  ia64/8.1/RPMS/krb5-libs-1.2.2-17.1mdk.ia64.rpm
 0d269c9de9d4ca3ce5043c48e11d89a9  ia64/8.1/RPMS/krb5-server-1.2.2-17.1mdk.ia64.rpm
 7ea03cfb5acf8368ee9dc38948e20004  ia64/8.1/RPMS/krb5-workstation-1.2.2-17.1mdk.ia64.rpm
 b5fd1c09022e4d8769f2438c47a556b9  ia64/8.1/RPMS/telnet-client-krb5-1.2.2-17.1mdk.ia64.rpm
 f8c0966cb4aeb43440729d100ca1efe0  ia64/8.1/RPMS/telnet-server-krb5-1.2.2-17.1mdk.ia64.rpm
 c8352cab7f15b40165c262eb7452ee47  ia64/8.1/SRPMS/krb5-1.2.2-17.1mdk.src.rpm

 Mandrake Linux 8.2:
 7098a97608f1fe05529262d3cf1a4fb1  8.2/RPMS/ftp-client-krb5-1.2.2-17.1mdk.i586.rpm
 6914be0f3375372362ac711085d1b759  8.2/RPMS/ftp-server-krb5-1.2.2-17.1mdk.i586.rpm
 1b28c3ebd6fc50910852a3e570dce56d  8.2/RPMS/krb5-devel-1.2.2-17.1mdk.i586.rpm
 4166e9de4911dba9f8abc18377824409  8.2/RPMS/krb5-libs-1.2.2-17.1mdk.i586.rpm
 9b2d74b5033f7f48e952895f9be257ea  8.2/RPMS/krb5-server-1.2.2-17.1mdk.i586.rpm
 217518db42b3944c20e5d846a547e95a  8.2/RPMS/krb5-workstation-1.2.2-17.1mdk.i586.rpm
 e7fcd7ce33f0d37b7081ae8c30bf51a9  8.2/RPMS/telnet-client-krb5-1.2.2-17.1mdk.i586.rpm
 b9b797231bff5adbf923f1798932309e  8.2/RPMS/telnet-server-krb5-1.2.2-17.1mdk.i586.rpm
 c8352cab7f15b40165c262eb7452ee47  8.2/SRPMS/krb5-1.2.2-17.1mdk.src.rpm

 Mandrake Linux 8.2/ppc:
 297aca7d09517e93464daefd9205a9cc  ppc/8.2/RPMS/ftp-client-krb5-1.2.2-17.1mdk.ppc.rpm
 b51db3d57d8570da0ea3bbb4ca176870  ppc/8.2/RPMS/ftp-server-krb5-1.2.2-17.1mdk.ppc.rpm
 978c3ee5ea5e76ba1da31f4cf233226d  ppc/8.2/RPMS/krb5-devel-1.2.2-17.1mdk.ppc.rpm
 877d6da339d0eaad3772e76fa915a7b3  ppc/8.2/RPMS/krb5-libs-1.2.2-17.1mdk.ppc.rpm
 4de95471463177c1fa1ad052715d7f62  ppc/8.2/RPMS/krb5-server-1.2.2-17.1mdk.ppc.rpm
 5cf93a0688533f78481dc53f429d6cca  ppc/8.2/RPMS/krb5-workstation-1.2.2-17.1mdk.ppc.rpm
 baf1103487f24eb5b0589593e7ddcdb7  ppc/8.2/RPMS/telnet-client-krb5-1.2.2-17.1mdk.ppc.rpm
 51a5289cbb13ed5d00cdacaaea038138  ppc/8.2/RPMS/telnet-server-krb5-1.2.2-17.1mdk.ppc.rpm
 c8352cab7f15b40165c262eb7452ee47  ppc/8.2/SRPMS/krb5-1.2.2-17.1mdk.src.rpm

Bug IDs fixed (see for more information):

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one 
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig 

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

Please be aware that sometimes it takes the mirrors a few hours to 

You can view other update advisories for Mandrake Linux at:

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by

If you want to report vulnerabilities, please contact
Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
DDoS Exploit Targets Open Source Rejetto HFS
Gemalto Confirms It Was Hacked But Insists the NSA Didnít Get Its Crypto Keys
Hackers exploit router flaws in unusual pharming attack
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.