TUCoPS :: Linux :: Mandrake/Mandriva :: bu-1456.htm

krb5 vulns
krb5
krb5




-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2010:005
http://www.mandriva.com/security/ 
 _______________________________________________________________________

 Package : krb5
 Date    : January 13, 2010
 Affected: Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in krb5:
 
 The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in
 the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before
 1.6.4 allows remote attackers to cause a denial of service (daemon
 crash) or possibly execute arbitrary code via vectors involving an
 invalid DER encoding that triggers a free of an uninitialized pointer
 (CVE-2009-0846).
 
 The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5
 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to
 cause a denial of service (application crash) via a crafted length
 value that triggers an erroneous malloc call, related to incorrect
 calculations with pointer arithmetic (CVE-2009-0847).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847 
 _______________________________________________________________________

 Updated Packages:

 Multi Network Firewall 2.0:
 89a9a2ea150c9a935ef6aae518f9bc6a  mnf/2.0/i586/ftp-client-krb5-1.3-6.11.M20mdk.i586.rpm
 50547a6dcfd037ebd10222b4c25954bc  mnf/2.0/i586/ftp-server-krb5-1.3-6.11.M20mdk.i586.rpm
 7ebbbd6d7374bebdff12ab28da4f3a12  mnf/2.0/i586/krb5-server-1.3-6.11.M20mdk.i586.rpm
 d2f2265f0d9b68df799dc82fadda5887  mnf/2.0/i586/krb5-workstation-1.3-6.11.M20mdk.i586.rpm
 3a467a675f59c3f8ea6778290abebaf6  mnf/2.0/i586/libkrb51-1.3-6.11.M20mdk.i586.rpm
 02601a40f77c526174e26667daf63cc2  mnf/2.0/i586/libkrb51-devel-1.3-6.11.M20mdk.i586.rpm
 43eaff29e6cd398c0b6cdb9dcdf28b74  mnf/2.0/i586/telnet-client-krb5-1.3-6.11.M20mdk.i586.rpm
 99b454ab3a0b20cae15da89ae69aa423  mnf/2.0/i586/telnet-server-krb5-1.3-6.11.M20mdk.i586.rpm 
 55029456c5057afbe7b344a265d2e53a  mnf/2.0/SRPMS/krb5-1.3-6.11.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories 

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLTj64mqjQ0CJFipgRAvXvAKDBm8q7/zwFwIKHqzS5CaCi2wRyDQCfSGUC
kvPWmWvFwAf15eT/066xZ4E=PqIH
-----END PGP SIGNATURE-----


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH