LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 15th, 2014
Linux Advisory Watch: August 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: kerberos buffer overflow vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux A remotely exploitable stack buffer overflow has been found in the Kerberos v4 compatibility administration daemon distributed with the Red Hat Linux krb5 packages.

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated kerberos packages available
Advisory ID:       RHSA-2002:242-06
Issue date:        2002-11-07
Updated on:        2002-11-06
Product:           Red Hat Linux
Keywords:          krb5 kadmind4
Cross references:  
Obsoletes:         RHSA-2002-172
CVE Names:         CAN-2002-1235
---------------------------------------------------------------------

1. Topic:

A remotely exploitable stack buffer overflow has been found in the Kerberos
v4 compatibility administration daemon distributed with the Red Hat Linux
krb5 packages.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc
Red Hat Linux 7.0 - alpha, i386
Red Hat Linux 7.1 - alpha, i386, ia64
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386

3. Problem description:

Kerberos is a network authentication system.

A stack buffer overflow has been found in the implementation of the
Kerberos v4 compatibility administration daemon (kadmind4), which is part
of the the MIT krb5 distribution.  This vulnerability is present in version
1.2.6 and earlier of the MIT krb5 distribution and can be exploited to gain
unauthorized root access to a KDC host.  The attacker does not need to
authenticate to the daemon to successfully perform this attack.

kadmind4 is included in the Kerberos packages in Red Hat Linux 6.2, 7, 7.1,
7.2, 7.3, and 8.0, but by default is not enabled or used.
All users of Kerberos are advised to upgrade to these errata packages which
contain a backported patch and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. RPMs required:

Red Hat Linux 6.2:

SRPMS: 
ftp://updates.Red Hat.com/6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm

alpha: 
ftp://updates.Red Hat.com/6.2/en/os/alpha/krb5-configs-1.1.1-30.alpha.rpm 
ftp://updates.Red Hat.com/6.2/en/os/alpha/krb5-workstation-1.1.1-30.alpha.rpm 
ftp://updates.Red Hat.com/6.2/en/os/alpha/krb5-server-1.1.1-30.alpha.rpm 
ftp://updates.Red Hat.com/6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.rpm 
ftp://updates.Red Hat.com/6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.rpm

i386: 
ftp://updates.Red Hat.com/6.2/en/os/i386/krb5-configs-1.1.1-30.i386.rpm 
ftp://updates.Red Hat.com/6.2/en/os/i386/krb5-workstation-1.1.1-30.i386.rpm 
ftp://updates.Red Hat.com/6.2/en/os/i386/krb5-server-1.1.1-30.i386.rpm 
ftp://updates.Red Hat.com/6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm 
ftp://updates.Red Hat.com/6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm

sparc: 
ftp://updates.Red Hat.com/6.2/en/os/sparc/krb5-configs-1.1.1-30.sparc.rpm 
ftp://updates.Red Hat.com/6.2/en/os/sparc/krb5-workstation-1.1.1-30.sparc.rpm 
ftp://updates.Red Hat.com/6.2/en/os/sparc/krb5-server-1.1.1-30.sparc.rpm 
ftp://updates.Red Hat.com/6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.rpm 
ftp://updates.Red Hat.com/6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.rpm

Red Hat Linux 7.0:

SRPMS: 
ftp://updates.Red Hat.com/7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm

alpha: 
ftp://updates.Red Hat.com/7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm 
ftp://updates.Red Hat.com/7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm 
ftp://updates.Red Hat.com/7.0/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm 
ftp://updates.Red Hat.com/7.0/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm

i386: 
ftp://updates.Red Hat.com/7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.0/en/os/i386/krb5-server-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.0/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm

Red Hat Linux 7.1:

SRPMS: 
ftp://updates.Red Hat.com/7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm

alpha: 
ftp://updates.Red Hat.com/7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm 
ftp://updates.Red Hat.com/7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm 
ftp://updates.Red Hat.com/7.1/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm 
ftp://updates.Red Hat.com/7.1/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm

i386: 
ftp://updates.Red Hat.com/7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/krb5-server-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm

ia64: 
ftp://updates.Red Hat.com/7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm 
ftp://updates.Red Hat.com/7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm 
ftp://updates.Red Hat.com/7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm 
ftp://updates.Red Hat.com/7.1/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm

Red Hat Linux 7.2:

SRPMS: 
ftp://updates.Red Hat.com/7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm

i386: 
ftp://updates.Red Hat.com/7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/krb5-server-1.2.2-15.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm

ia64: 
ftp://updates.Red Hat.com/7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm 
ftp://updates.Red Hat.com/7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm 
ftp://updates.Red Hat.com/7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm 
ftp://updates.Red Hat.com/7.2/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm

Red Hat Linux 7.3:

SRPMS: 
ftp://updates.Red Hat.com/7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm

i386: 
ftp://updates.Red Hat.com/7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm 
ftp://updates.Red Hat.com/7.3/en/os/i386/krb5-workstation-1.2.4-3.i386.rpm

Red Hat Linux 8.0:

SRPMS: 
ftp://updates.Red Hat.com/8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm

i386: 
ftp://updates.Red Hat.com/8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm 
ftp://updates.Red Hat.com/8.0/en/os/i386/krb5-workstation-1.2.5-7.i386.rpm



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
29835dc36d43458e2896d32fcc6aaefc 6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm
a03f069ca6c9b9cf40d4dae5238fea8f 6.2/en/os/alpha/krb5-configs-1.1.1-30.alpha.rpm
093d8de8a7a5ff3cd5150f6209f8d33b 6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.rpm
2cf89842ac13c56343faf7c3ce702f93 6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.rpm
a339c1a19906c541ff5c0ad421fed9ee 6.2/en/os/alpha/krb5-server-1.1.1-30.alpha.rpm
195781d7b6b3097a6fc4b6002b053d6a 6.2/en/os/alpha/krb5-workstation-1.1.1-30.alpha.rpm
098c6a60ba6509669d27c2fd7bdf6e09 6.2/en/os/i386/krb5-configs-1.1.1-30.i386.rpm
974a35ba5f3d987782e89d3b11c53a0e 6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm
878234d08a4a360636b8d1097f66a608 6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm
deaa2561f5a43e4c84c90991f5b6661a 6.2/en/os/i386/krb5-server-1.1.1-30.i386.rpm
d14d28cd6b99d784958199a0a324ac40 6.2/en/os/i386/krb5-workstation-1.1.1-30.i386.rpm
a8121efd45a11f4989d62ecfaecc785c 6.2/en/os/sparc/krb5-configs-1.1.1-30.sparc.rpm
fbd89ccc029ea8f0734c8ff16a8a4070 6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.rpm
752d0aba417d373af3ca238ac6aceec9 6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.rpm
01bb57e5c29ff56ce05d97a6a63032d0 6.2/en/os/sparc/krb5-server-1.1.1-30.sparc.rpm
5a1dd1014348d79e9419b217da397f9f 6.2/en/os/sparc/krb5-workstation-1.1.1-30.sparc.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm
4634252b38d5cc0ac793576f418488d7 7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
58d712af3b4bbc9dc8d18c95071f25e2 7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
7dcf3f329b91df414383889ee8861d68 7.0/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
a873196deacca249259faba88ee3dea0 7.0/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.0/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.0/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm
4634252b38d5cc0ac793576f418488d7 7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
58d712af3b4bbc9dc8d18c95071f25e2 7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
7dcf3f329b91df414383889ee8861d68 7.1/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
a873196deacca249259faba88ee3dea0 7.1/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.1/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.1/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
990af79a788a677108e6084b784a0822 7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
8cd2e5c9ee33713e200153d5786c0f11 7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
214314fac18e357f871cb36ee2d4d1c7 7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
1793ab94f8cc2a8913cef009be761291 7.1/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.2/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.2/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
990af79a788a677108e6084b784a0822 7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
8cd2e5c9ee33713e200153d5786c0f11 7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
214314fac18e357f871cb36ee2d4d1c7 7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
1793ab94f8cc2a8913cef009be761291 7.2/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm
798f28aa820a9be1521e2a4554c5ea44 7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm
bbdada43207b16dea1f1f70d1605f47c 7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm
ef2c48903f9f39d32af13f42bcc05b32 7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm
a79d2cf51f59cc6b7e1b321dcdb7f303 7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm
6acfd6a13c27b03a6412438b60981d17 7.3/en/os/i386/krb5-workstation-1.2.4-3.i386.rpm
24fb18f8ed3de853a4d1a5661516b77a 8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm
f7135174d00471fb33ff41a93f5c8242 8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm
4eb103a0ffe97d45ec0ddb5977cc208f 8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm
0f9cbbd3381defa181793b28d503884f 8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm
ed8e5d8c8d323d4e85f2a6beef54caf8 8.0/en/os/i386/krb5-workstation-1.2.5-7.i386.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at  http://www.Red Hat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    
    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum 


7. References:
 
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1235

8. Contact:

The Red Hat security contact is <security@Red Hat.com>.  More contact
details at  http://www.Red Hat.com/solutions/security/news/contact.html

Copyright(c) 2000, 2001, 2002 Red Hat, Inc.




 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
State-of-the-art spear phishing and defenses
Linux kernel source code repositories get better security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.