blob: 63847d121a84e9176f1181e060706aa37b130f3f [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200405-23">
<title>Heimdal: Kerberos 4 buffer overflow in kadmin</title>
A possible buffer overflow in the Kerberos 4 component of Heimdal has been
<product type="ebuild">Heimdal</product>
<announced>May 27, 2004</announced>
<revised>May 27, 2004: 01</revised>
<access>remote </access>
<package name="app-crypt/heimdal" auto="yes" arch="*">
<unaffected range="ge">0.6.2</unaffected>
<vulnerable range="lt">0.6.2</vulnerable>
Heimdal is a free implementation of Kerberos.
A buffer overflow was discovered in kadmind, a server for administrative
access to the Kerberos database.
<impact type="high">
By sending a specially formatted message to kadmind, a remote attacker may
be able to crash kadmind causing a denial of service, or execute arbitrary
code with the permissions of the kadmind process.
For a temporary workaround, providing you do not require Kerberos 4
support, you may turn off Kerberos 4 kadmin by running kadmind with the
--no-kerberos4 option.
All Heimdal users should upgrade to the latest stable version:
# emerge sync
# emerge -pv ">=app-crypt/heimdal-0.6.2"
# emerge ">=app-crypt/heimdal-0.6.2"</code>
<uri link="">Heimdal 0.6.2 Release Notice</uri>
<uri link="">CAN-2004-0434</uri>
<metadata tag="submitter">