Red Hat alert: Updated kerberos packages available

Posted by dave on Nov 7, 2002 7:27 AM EDT
Mailing list
Mail this story
Print this story

A remotely exploitable stack buffer overflow has been found in the Kerberos v4 compatibility administration daemon distributed with the Red Hat Linux krb5 packages.

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated kerberos packages available
Advisory ID:       RHSA-2002:242-06
Issue date:        2002-11-07
Updated on:        2002-11-06
Product:           Red Hat Linux
Keywords:          krb5 kadmind4
Cross references:  
Obsoletes:         RHSA-2002-172
CVE Names:         CAN-2002-1235
---------------------------------------------------------------------

1. Topic:

A remotely exploitable stack buffer overflow has been found in the Kerberos
v4 compatibility administration daemon distributed with the Red Hat Linux
krb5 packages.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc
Red Hat Linux 7.0 - alpha, i386
Red Hat Linux 7.1 - alpha, i386, ia64
Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386

3. Problem description:

Kerberos is a network authentication system.

A stack buffer overflow has been found in the implementation of the
Kerberos v4 compatibility administration daemon (kadmind4), which is part
of the the MIT krb5 distribution.  This vulnerability is present in version
1.2.6 and earlier of the MIT krb5 distribution and can be exploited to gain
unauthorized root access to a KDC host.  The attacker does not need to
authenticate to the daemon to successfully perform this attack.

kadmind4 is included in the Kerberos packages in Red Hat Linux 6.2, 7, 7.1,
7.2, 7.3, and 8.0, but by default is not enabled or used.

All users of Kerberos are advised to upgrade to these errata packages which
contain a backported patch and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-configs-1.1.1-30.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-workstation-1.1.1-30.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-server-1.1.1-30.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/krb5-configs-1.1.1-30.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/krb5-workstation-1.1.1-30.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/krb5-server-1.1.1-30.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-configs-1.1.1-30.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-workstation-1.1.1-30.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-server-1.1.1-30.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/krb5-server-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/krb5-server-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/krb5-server-1.2.2-15.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/krb5-workstation-1.2.4-3.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/krb5-workstation-1.2.5-7.i386.rpm



6. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
29835dc36d43458e2896d32fcc6aaefc 6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm
a03f069ca6c9b9cf40d4dae5238fea8f 6.2/en/os/alpha/krb5-configs-1.1.1-30.alpha.rpm
093d8de8a7a5ff3cd5150f6209f8d33b 6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.rpm
2cf89842ac13c56343faf7c3ce702f93 6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.rpm
a339c1a19906c541ff5c0ad421fed9ee 6.2/en/os/alpha/krb5-server-1.1.1-30.alpha.rpm
195781d7b6b3097a6fc4b6002b053d6a 6.2/en/os/alpha/krb5-workstation-1.1.1-30.alpha.rpm
098c6a60ba6509669d27c2fd7bdf6e09 6.2/en/os/i386/krb5-configs-1.1.1-30.i386.rpm
974a35ba5f3d987782e89d3b11c53a0e 6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm
878234d08a4a360636b8d1097f66a608 6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm
deaa2561f5a43e4c84c90991f5b6661a 6.2/en/os/i386/krb5-server-1.1.1-30.i386.rpm
d14d28cd6b99d784958199a0a324ac40 6.2/en/os/i386/krb5-workstation-1.1.1-30.i386.rpm
a8121efd45a11f4989d62ecfaecc785c 6.2/en/os/sparc/krb5-configs-1.1.1-30.sparc.rpm
fbd89ccc029ea8f0734c8ff16a8a4070 6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.rpm
752d0aba417d373af3ca238ac6aceec9 6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.rpm
01bb57e5c29ff56ce05d97a6a63032d0 6.2/en/os/sparc/krb5-server-1.1.1-30.sparc.rpm
5a1dd1014348d79e9419b217da397f9f 6.2/en/os/sparc/krb5-workstation-1.1.1-30.sparc.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm
4634252b38d5cc0ac793576f418488d7 7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
58d712af3b4bbc9dc8d18c95071f25e2 7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
7dcf3f329b91df414383889ee8861d68 7.0/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
a873196deacca249259faba88ee3dea0 7.0/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.0/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.0/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm
4634252b38d5cc0ac793576f418488d7 7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm
58d712af3b4bbc9dc8d18c95071f25e2 7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm
7dcf3f329b91df414383889ee8861d68 7.1/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm
a873196deacca249259faba88ee3dea0 7.1/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.1/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.1/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
990af79a788a677108e6084b784a0822 7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
8cd2e5c9ee33713e200153d5786c0f11 7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
214314fac18e357f871cb36ee2d4d1c7 7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
1793ab94f8cc2a8913cef009be761291 7.1/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm
bd9dfbd903a20985589a1ecb7bf85a55 7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm
66e5f07a6159b3581cbc4ac4afed705d 7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm
48e39df2e734c3915b61a33e7881561d 7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm
023156f85301778b85f12eeb043ad9d1 7.2/en/os/i386/krb5-server-1.2.2-15.i386.rpm
95b863c88b71383fe78f5d286b311209 7.2/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm
990af79a788a677108e6084b784a0822 7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm
8cd2e5c9ee33713e200153d5786c0f11 7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm
214314fac18e357f871cb36ee2d4d1c7 7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm
1793ab94f8cc2a8913cef009be761291 7.2/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm
798f28aa820a9be1521e2a4554c5ea44 7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm
bbdada43207b16dea1f1f70d1605f47c 7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm
ef2c48903f9f39d32af13f42bcc05b32 7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm
a79d2cf51f59cc6b7e1b321dcdb7f303 7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm
6acfd6a13c27b03a6412438b60981d17 7.3/en/os/i386/krb5-workstation-1.2.4-3.i386.rpm
24fb18f8ed3de853a4d1a5661516b77a 8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm
f7135174d00471fb33ff41a93f5c8242 8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm
4eb103a0ffe97d45ec0ddb5977cc208f 8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm
0f9cbbd3381defa181793b28d503884f 8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm
ed8e5d8c8d323d4e85f2a6beef54caf8 8.0/en/os/i386/krb5-workstation-1.2.5-7.i386.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    
    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum 


7. References:

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1235

8. Contact:

The Red Hat security contact is .  More contact
details at http://www.redhat.com/solutions/security/news/contact.html

Copyright(c) 2000, 2001, 2002 Red Hat, Inc.

  Nav
» Read more about: Story Type: Security; Groups: Red Hat

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.