---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated kerberos packages available
Advisory ID:       RHSA-2002:242-06
Issue date:        2002-11-07
Updated on:        2002-11-06
Product:           Red Hat Linux
Keywords:          krb5 kadmind4
Cross references:  
Obsoletes:         RHSA-2002-172
CVE Names:         CAN-2002-1235
---------------------------------------------------------------------

1. Topic:

A remotely exploitable stack buffer overflow has been found in the Kerberos
v4 compatibility administration daemon distributed with the Red Hat Linux
krb5 packages.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc
Red Hat Linux 7.0 - alpha, i386
Red Hat Linux 7.1 - alpha, i386, ia64
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386

3. Problem description:

Kerberos is a network authentication system.

A stack buffer overflow has been found in the implementation of the
Kerberos v4 compatibility administration daemon (kadmind4), which is part
of the the MIT krb5 distribution.  This vulnerability is present in version
1.2.6 and earlier of the MIT krb5 distribution and can be exploited to gain
unauthorized root access to a KDC host.  The attacker does not need to
authenticate to the daemon to successfully perform this attack.

kadmind4 is included in the Kerberos packages in Red Hat Linux 6.2, 7, 7.1,
7.2, 7.3, and 8.0, but by default is not enabled or used.
All users of Kerberos are advised to upgrade to these errata packages which
contain a backported patch and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. RPMs required:

Red Hat Linux 6.2:

SRPMS: 
 

alpha: 
  
  
  
  
 

i386: 
  
  
  
  
 

sparc: 
  
  
  
  
 

Red Hat Linux 7.0:

SRPMS: 
 

alpha: 
  
  
  
 

i386: 
  
  
  
 

Red Hat Linux 7.1:

SRPMS: 
 

alpha: 
  
  
  
 

i386: 
  
  
  
 

ia64: 
  
  
  
 

Red Hat Linux 7.2:

SRPMS: 
 

i386: 
  
  
  
 

ia64: 
  
  
  
 

Red Hat Linux 7.3:

SRPMS: 
 

i386: 
  
  
  
 

Red Hat Linux 8.0:

SRPMS: 
 

i386: 
  
  
  
 



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
29835dc36d43458e2896d32fcc6aaefc 6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm
a03f069ca6c9b9cf40d4dae5238fea8f 6.2/en/os/alpha/krb5-configs-1.1.1-30.alpha.rpm
093d8de8a7a5ff3cd5150f6209f8d33b 6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.rpm
2cf89842ac13c56343faf7c3ce702f93 6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.rpm
a339c1a19906c541ff5c0ad421fed9ee 6.2/en/os/alpha/krb5-server-1.1.1-30.alpha.rpm
195781d7b6b3097a6fc4b6002b053d6a 6.2/en/os/alpha/krb5-workstation-1.1.1-30.alpha.rpm
098c6a60ba6509669d27c2fd7bdf6e09 6.2/en/os/i386/krb5-configs-1.1.1-30.i386.rpm
974a35ba5f3d987782e89d3b11c53a0e 6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm
878234d08a4a360636b8d1097f66a608 6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm
deaa2561f5a43e4c84c90991f5b6661a 6.2/en/os/i386/krb5-server-1.1.1-30.i386.rpm
d14d28cd6b99d784958199a0a324ac40 6.2/en/os/i386/krb5-workstation-1.1.1-30.i386.rpm
a8121efd45a11f4989d62ecfaecc785c 6.2/en/os/sparc/krb5-configs-1.1.1-30.sparc.rpm
fbd89ccc029ea8f0734c8ff16a8a4070 6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.rpm
752d0aba417d373af3ca238ac6aceec9 6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.rpm
01bb57e5c29ff56ce05d97a6a63032d0 6.2/en/os/sparc/krb5-server-1.1.1-30.sparc.rpm
5a1dd1014348d79e9419b217da397f9f 6.2/en/os/sparc/krb5-workstation-1.1.1-30.sparc.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm
4634252b38d5cc0ac793576f418488d7 7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
58d712af3b4bbc9dc8d18c95071f25e2 7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
7dcf3f329b91df414383889ee8861d68 7.0/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
a873196deacca249259faba88ee3dea0 7.0/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.0/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.0/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm
4634252b38d5cc0ac793576f418488d7 7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
58d712af3b4bbc9dc8d18c95071f25e2 7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
7dcf3f329b91df414383889ee8861d68 7.1/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
a873196deacca249259faba88ee3dea0 7.1/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.1/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.1/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
990af79a788a677108e6084b784a0822 7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
8cd2e5c9ee33713e200153d5786c0f11 7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
214314fac18e357f871cb36ee2d4d1c7 7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
1793ab94f8cc2a8913cef009be761291 7.1/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.2/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.2/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
990af79a788a677108e6084b784a0822 7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
8cd2e5c9ee33713e200153d5786c0f11 7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
214314fac18e357f871cb36ee2d4d1c7 7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
1793ab94f8cc2a8913cef009be761291 7.2/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm
798f28aa820a9be1521e2a4554c5ea44 7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm
bbdada43207b16dea1f1f70d1605f47c 7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm
ef2c48903f9f39d32af13f42bcc05b32 7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm
a79d2cf51f59cc6b7e1b321dcdb7f303 7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm
6acfd6a13c27b03a6412438b60981d17 7.3/en/os/i386/krb5-workstation-1.2.4-3.i386.rpm
24fb18f8ed3de853a4d1a5661516b77a 8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm
f7135174d00471fb33ff41a93f5c8242 8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm
4eb103a0ffe97d45ec0ddb5977cc208f 8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm
0f9cbbd3381defa181793b28d503884f 8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm
ed8e5d8c8d323d4e85f2a6beef54caf8 8.0/en/os/i386/krb5-workstation-1.2.5-7.i386.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at  About

You can verify each package with the following command:
    
    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum 


7. References:
 
mit 
CVE -CVE-2002-1235

8. Contact:

The Red Hat security contact is <security@RedHat.com>.  More contact
details at  All Red Hat products

Copyright(c) 2000, 2001, 2002 Red Hat, Inc.




RedHat: kerberos buffer overflow vulnerability

A remotely exploitable stack buffer overflow has been found in the Kerberos v4 compatibility administration daemon distributed with the Red Hat Linux krb5 packages.

Summary



Summary

Kerberos is a network authentication system.A stack buffer overflow has been found in the implementation of theKerberos v4 compatibility administration daemon (kadmind4), which is partof the the MIT krb5 distribution. This vulnerability is present in version1.2.6 and earlier of the MIT krb5 distribution and can be exploited to gainunauthorized root access to a KDC host. The attacker does not need toauthenticate to the daemon to successfully perform this attack.kadmind4 is included in the Kerberos packages in Red Hat Linux 6.2, 7, 7.1,7.2, 7.3, and 8.0, but by default is not enabled or used.All users of Kerberos are advised to upgrade to these errata packages whichcontain a backported patch and are not vulnerable to this issue.


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.
Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. RPMs required:
Red Hat Linux 6.2:
SRPMS:

alpha:





i386:





sparc:





Red Hat Linux 7.0:
SRPMS:

alpha:




i386:




Red Hat Linux 7.1:
SRPMS:

alpha:




i386:




ia64:




Red Hat Linux 7.2:
SRPMS:

i386:




ia64:




Red Hat Linux 7.3:
SRPMS:

i386:




Red Hat Linux 8.0:
SRPMS:

i386:






6. Verification:
MD5 sum Package Name 29835dc36d43458e2896d32fcc6aaefc 6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm a03f069ca6c9b9cf40d4dae5238fea8f 6.2/en/os/alpha/krb5-configs-1.1.1-30.alpha.rpm 093d8de8a7a5ff3cd5150f6209f8d33b 6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.rpm 2cf89842ac13c56343faf7c3ce702f93 6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.rpm a339c1a19906c541ff5c0ad421fed9ee 6.2/en/os/alpha/krb5-server-1.1.1-30.alpha.rpm 195781d7b6b3097a6fc4b6002b053d6a 6.2/en/os/alpha/krb5-workstation-1.1.1-30.alpha.rpm 098c6a60ba6509669d27c2fd7bdf6e09 6.2/en/os/i386/krb5-configs-1.1.1-30.i386.rpm 974a35ba5f3d987782e89d3b11c53a0e 6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm 878234d08a4a360636b8d1097f66a608 6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm deaa2561f5a43e4c84c90991f5b6661a 6.2/en/os/i386/krb5-server-1.1.1-30.i386.rpm d14d28cd6b99d784958199a0a324ac40 6.2/en/os/i386/krb5-workstation-1.1.1-30.i386.rpm a8121efd45a11f4989d62ecfaecc785c 6.2/en/os/sparc/krb5-configs-1.1.1-30.sparc.rpm fbd89ccc029ea8f0734c8ff16a8a4070 6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.rpm 752d0aba417d373af3ca238ac6aceec9 6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.rpm 01bb57e5c29ff56ce05d97a6a63032d0 6.2/en/os/sparc/krb5-server-1.1.1-30.sparc.rpm 5a1dd1014348d79e9419b217da397f9f 6.2/en/os/sparc/krb5-workstation-1.1.1-30.sparc.rpm bd9dfbd903a20985589a1ecb7bf85a55 7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm 4634252b38d5cc0ac793576f418488d7 7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm 58d712af3b4bbc9dc8d18c95071f25e2 7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm 7dcf3f329b91df414383889ee8861d68 7.0/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm a873196deacca249259faba88ee3dea0 7.0/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm 66e5f07a6159b3581cbc4ac4afed705d 7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 48e39df2e734c3915b61a33e7881561d 7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 023156f85301778b85f12eeb043ad9d1 7.0/en/os/i386/krb5-server-1.2.2-15.i386.rpm 95b863c88b71383fe78f5d286b311209 7.0/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm bd9dfbd903a20985589a1ecb7bf85a55 7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm 4634252b38d5cc0ac793576f418488d7 7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm 58d712af3b4bbc9dc8d18c95071f25e2 7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm 7dcf3f329b91df414383889ee8861d68 7.1/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm a873196deacca249259faba88ee3dea0 7.1/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm 66e5f07a6159b3581cbc4ac4afed705d 7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 48e39df2e734c3915b61a33e7881561d 7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 023156f85301778b85f12eeb043ad9d1 7.1/en/os/i386/krb5-server-1.2.2-15.i386.rpm 95b863c88b71383fe78f5d286b311209 7.1/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm 990af79a788a677108e6084b784a0822 7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm 8cd2e5c9ee33713e200153d5786c0f11 7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm 214314fac18e357f871cb36ee2d4d1c7 7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm 1793ab94f8cc2a8913cef009be761291 7.1/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm bd9dfbd903a20985589a1ecb7bf85a55 7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm 66e5f07a6159b3581cbc4ac4afed705d 7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 48e39df2e734c3915b61a33e7881561d 7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 023156f85301778b85f12eeb043ad9d1 7.2/en/os/i386/krb5-server-1.2.2-15.i386.rpm 95b863c88b71383fe78f5d286b311209 7.2/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm 990af79a788a677108e6084b784a0822 7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm 8cd2e5c9ee33713e200153d5786c0f11 7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm 214314fac18e357f871cb36ee2d4d1c7 7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm 1793ab94f8cc2a8913cef009be761291 7.2/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm 798f28aa820a9be1521e2a4554c5ea44 7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm bbdada43207b16dea1f1f70d1605f47c 7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm ef2c48903f9f39d32af13f42bcc05b32 7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm a79d2cf51f59cc6b7e1b321dcdb7f303 7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm 6acfd6a13c27b03a6412438b60981d17 7.3/en/os/i386/krb5-workstation-1.2.4-3.i386.rpm 24fb18f8ed3de853a4d1a5661516b77a 8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm f7135174d00471fb33ff41a93f5c8242 8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm 4eb103a0ffe97d45ec0ddb5977cc208f 8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm 0f9cbbd3381defa181793b28d503884f 8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm ed8e5d8c8d323d4e85f2a6beef54caf8 8.0/en/os/i386/krb5-workstation-1.2.5-7.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our key is available at About
You can verify each package with the following command:
rpm --checksig -v
If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
md5sum

Package List


Severity
Advisory ID: RHSA-2002:242-06
Issued Date: : 2002-11-07
Updated on: 2002-11-06
Product: Red Hat Linux
Keywords: krb5 kadmind4
Cross references:
Obsoletes: RHSA-2002-172
CVE Names: CAN-2002-1235

Topic


Topic

A remotely exploitable stack buffer overflow has been found in the Kerberos

v4 compatibility administration daemon distributed with the Red Hat Linux

krb5 packages.


 

Relevant Releases Architectures

Red Hat Linux 6.2 - alpha, i386, sparc

Red Hat Linux 7.0 - alpha, i386

Red Hat Linux 7.1 - alpha, i386, ia64

Red Hat Linux 7.2 - i386, ia64

Red Hat Linux 7.3 - i386

Red Hat Linux 8.0 - i386


Bugs Fixed


Related News