The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[RHSA-2002:242-06] Updated kerberos packages available


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Thu, 7 Nov 2002 11:27 -0500
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com, redhat-announce-list@redhat.com
Subject: [RHSA-2002:242-06] Updated kerberos packages available

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated kerberos packages available
Advisory ID:       RHSA-2002:242-06
Issue date:        2002-11-07
Updated on:        2002-11-06
Product:           Red Hat Linux
Ключевые слова: , , , , , , , , , krb5, kadmind4,  (найти похожие документы)
Cross references:=20=20 Obsoletes: RHSA-2002-172 CVE Names: CAN-2002-1235 --------------------------------------------------------------------- 1. Topic: A remotely exploitable stack buffer overflow has been found in the Kerberos v4 compatibility administration daemon distributed with the Red Hat Linux krb5 packages. 2. Relevant releases/architectures: Red Hat Linux 6.2 - alpha, i386, sparc Red Hat Linux 7.0 - alpha, i386 Red Hat Linux 7.1 - alpha, i386, ia64 Red Hat Linux 7.2 - i386, ia64 Red Hat Linux 7.3 - i386 Red Hat Linux 8.0 - i386 3. Problem description: Kerberos is a network authentication system. A stack buffer overflow has been found in the implementation of the Kerberos v4 compatibility administration daemon (kadmind4), which is part of the the MIT krb5 distribution. This vulnerability is present in version 1.2.6 and earlier of the MIT krb5 distribution and can be exploited to gain unauthorized root access to a KDC host. The attacker does not need to authenticate to the daemon to successfully perform this attack. kadmind4 is included in the Kerberos packages in Red Hat Linux 6.2, 7, 7.1, 7.2, 7.3, and 8.0, but by default is not enabled or used. All users of Kerberos are advised to upgrade to these errata packages which contain a backported patch and are not vulnerable to this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. RPMs required: Red Hat Linux 6.2: SRPMS: ftp://updates.redhat.com/6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm alpha: ftp://updates.redhat.com/6.2/en/os/alpha/krb5-configs-1.1.1-30.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/krb5-workstation-1.1.1-30.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/krb5-server-1.1.1-30.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.rpm ftp://updates.redhat.com/6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.rpm i386: ftp://updates.redhat.com/6.2/en/os/i386/krb5-configs-1.1.1-30.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/krb5-workstation-1.1.1-30.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/krb5-server-1.1.1-30.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm ftp://updates.redhat.com/6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm sparc: ftp://updates.redhat.com/6.2/en/os/sparc/krb5-configs-1.1.1-30.sparc.rpm ftp://updates.redhat.com/6.2/en/os/sparc/krb5-workstation-1.1.1-30.sparc.rpm ftp://updates.redhat.com/6.2/en/os/sparc/krb5-server-1.1.1-30.sparc.rpm ftp://updates.redhat.com/6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.rpm ftp://updates.redhat.com/6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.rpm Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm alpha: ftp://updates.redhat.com/7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/krb5-server-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm alpha: ftp://updates.redhat.com/7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/krb5-server-1.2.2-15.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/krb5-workstation-1.2.2-15.alpha.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/krb5-server-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm ia64: ftp://updates.redhat.com/7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/krb5-server-1.2.2-15.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/krb5-workstation-1.2.2-15.i386.rpm ia64: ftp://updates.redhat.com/7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.rpm ftp://updates.redhat.com/7.2/en/os/ia64/krb5-workstation-1.2.2-15.ia64.rpm Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/krb5-workstation-1.2.4-3.i386.rpm Red Hat Linux 8.0: SRPMS: ftp://updates.redhat.com/8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm i386: ftp://updates.redhat.com/8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm ftp://updates.redhat.com/8.0/en/os/i386/krb5-workstation-1.2.5-7.i386.rpm 6. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 29835dc36d43458e2896d32fcc6aaefc 6.2/en/os/SRPMS/krb5-1.1.1-30.src.rpm a03f069ca6c9b9cf40d4dae5238fea8f 6.2/en/os/alpha/krb5-configs-1.1.1-30.alph= a.rpm 093d8de8a7a5ff3cd5150f6209f8d33b 6.2/en/os/alpha/krb5-devel-1.1.1-30.alpha.= rpm 2cf89842ac13c56343faf7c3ce702f93 6.2/en/os/alpha/krb5-libs-1.1.1-30.alpha.r= pm a339c1a19906c541ff5c0ad421fed9ee 6.2/en/os/alpha/krb5-server-1.1.1-30.alpha= .rpm 195781d7b6b3097a6fc4b6002b053d6a 6.2/en/os/alpha/krb5-workstation-1.1.1-30.= alpha.rpm 098c6a60ba6509669d27c2fd7bdf6e09 6.2/en/os/i386/krb5-configs-1.1.1-30.i386.= rpm 974a35ba5f3d987782e89d3b11c53a0e 6.2/en/os/i386/krb5-devel-1.1.1-30.i386.rpm 878234d08a4a360636b8d1097f66a608 6.2/en/os/i386/krb5-libs-1.1.1-30.i386.rpm deaa2561f5a43e4c84c90991f5b6661a 6.2/en/os/i386/krb5-server-1.1.1-30.i386.r= pm d14d28cd6b99d784958199a0a324ac40 6.2/en/os/i386/krb5-workstation-1.1.1-30.i= 386.rpm a8121efd45a11f4989d62ecfaecc785c 6.2/en/os/sparc/krb5-configs-1.1.1-30.spar= c.rpm fbd89ccc029ea8f0734c8ff16a8a4070 6.2/en/os/sparc/krb5-devel-1.1.1-30.sparc.= rpm 752d0aba417d373af3ca238ac6aceec9 6.2/en/os/sparc/krb5-libs-1.1.1-30.sparc.r= pm 01bb57e5c29ff56ce05d97a6a63032d0 6.2/en/os/sparc/krb5-server-1.1.1-30.sparc= .rpm 5a1dd1014348d79e9419b217da397f9f 6.2/en/os/sparc/krb5-workstation-1.1.1-30.= sparc.rpm bd9dfbd903a20985589a1ecb7bf85a55 7.0/en/os/SRPMS/krb5-1.2.2-15.src.rpm 4634252b38d5cc0ac793576f418488d7 7.0/en/os/alpha/krb5-devel-1.2.2-15.alpha.= rpm 58d712af3b4bbc9dc8d18c95071f25e2 7.0/en/os/alpha/krb5-libs-1.2.2-15.alpha.r= pm 7dcf3f329b91df414383889ee8861d68 7.0/en/os/alpha/krb5-server-1.2.2-15.alpha= .rpm a873196deacca249259faba88ee3dea0 7.0/en/os/alpha/krb5-workstation-1.2.2-15.= alpha.rpm 66e5f07a6159b3581cbc4ac4afed705d 7.0/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 48e39df2e734c3915b61a33e7881561d 7.0/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 023156f85301778b85f12eeb043ad9d1 7.0/en/os/i386/krb5-server-1.2.2-15.i386.r= pm 95b863c88b71383fe78f5d286b311209 7.0/en/os/i386/krb5-workstation-1.2.2-15.i= 386.rpm bd9dfbd903a20985589a1ecb7bf85a55 7.1/en/os/SRPMS/krb5-1.2.2-15.src.rpm 4634252b38d5cc0ac793576f418488d7 7.1/en/os/alpha/krb5-devel-1.2.2-15.alpha.= rpm 58d712af3b4bbc9dc8d18c95071f25e2 7.1/en/os/alpha/krb5-libs-1.2.2-15.alpha.r= pm 7dcf3f329b91df414383889ee8861d68 7.1/en/os/alpha/krb5-server-1.2.2-15.alpha= .rpm a873196deacca249259faba88ee3dea0 7.1/en/os/alpha/krb5-workstation-1.2.2-15.= alpha.rpm 66e5f07a6159b3581cbc4ac4afed705d 7.1/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 48e39df2e734c3915b61a33e7881561d 7.1/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 023156f85301778b85f12eeb043ad9d1 7.1/en/os/i386/krb5-server-1.2.2-15.i386.r= pm 95b863c88b71383fe78f5d286b311209 7.1/en/os/i386/krb5-workstation-1.2.2-15.i= 386.rpm 990af79a788a677108e6084b784a0822 7.1/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm 8cd2e5c9ee33713e200153d5786c0f11 7.1/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm 214314fac18e357f871cb36ee2d4d1c7 7.1/en/os/ia64/krb5-server-1.2.2-15.ia64.r= pm 1793ab94f8cc2a8913cef009be761291 7.1/en/os/ia64/krb5-workstation-1.2.2-15.i= a64.rpm bd9dfbd903a20985589a1ecb7bf85a55 7.2/en/os/SRPMS/krb5-1.2.2-15.src.rpm 66e5f07a6159b3581cbc4ac4afed705d 7.2/en/os/i386/krb5-devel-1.2.2-15.i386.rpm 48e39df2e734c3915b61a33e7881561d 7.2/en/os/i386/krb5-libs-1.2.2-15.i386.rpm 023156f85301778b85f12eeb043ad9d1 7.2/en/os/i386/krb5-server-1.2.2-15.i386.r= pm 95b863c88b71383fe78f5d286b311209 7.2/en/os/i386/krb5-workstation-1.2.2-15.i= 386.rpm 990af79a788a677108e6084b784a0822 7.2/en/os/ia64/krb5-devel-1.2.2-15.ia64.rpm 8cd2e5c9ee33713e200153d5786c0f11 7.2/en/os/ia64/krb5-libs-1.2.2-15.ia64.rpm 214314fac18e357f871cb36ee2d4d1c7 7.2/en/os/ia64/krb5-server-1.2.2-15.ia64.r= pm 1793ab94f8cc2a8913cef009be761291 7.2/en/os/ia64/krb5-workstation-1.2.2-15.i= a64.rpm 798f28aa820a9be1521e2a4554c5ea44 7.3/en/os/SRPMS/krb5-1.2.4-3.src.rpm bbdada43207b16dea1f1f70d1605f47c 7.3/en/os/i386/krb5-devel-1.2.4-3.i386.rpm ef2c48903f9f39d32af13f42bcc05b32 7.3/en/os/i386/krb5-libs-1.2.4-3.i386.rpm a79d2cf51f59cc6b7e1b321dcdb7f303 7.3/en/os/i386/krb5-server-1.2.4-3.i386.rpm 6acfd6a13c27b03a6412438b60981d17 7.3/en/os/i386/krb5-workstation-1.2.4-3.i3= 86.rpm 24fb18f8ed3de853a4d1a5661516b77a 8.0/en/os/SRPMS/krb5-1.2.5-7.src.rpm f7135174d00471fb33ff41a93f5c8242 8.0/en/os/i386/krb5-devel-1.2.5-7.i386.rpm 4eb103a0ffe97d45ec0ddb5977cc208f 8.0/en/os/i386/krb5-libs-1.2.5-7.i386.rpm 0f9cbbd3381defa181793b28d503884f 8.0/en/os/i386/krb5-server-1.2.5-7.i386.rpm ed8e5d8c8d323d4e85f2a6beef54caf8 8.0/en/os/i386/krb5-workstation-1.2.5-7.i3= 86.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: =20=20=20=20 rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: =20=20=20=20 md5sum <filename> 7. References: http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-1235 8. Contact: The Red Hat security contact is <security@redhat.com>. More contact details at http://www.redhat.com/solutions/security/news/contact.html Copyright(c) 2000, 2001, 2002 Red Hat, Inc.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру