blob: 5612743e959a0ac0dfe3ffa84f3965e1a4a76822 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200504-28">
<title>Heimdal: Buffer overflow vulnerabilities</title>
Buffer overflow vulnerabilities have been found in the telnet client in
Heimdal which could lead to execution of arbitrary code.
<product type="ebuild">Heimdal</product>
<announced>April 28, 2005</announced>
<revised>April 28, 2005: 01</revised>
<package name="app-crypt/heimdal" auto="yes" arch="*">
<unaffected range="ge">0.6.4</unaffected>
<vulnerable range="lt">0.6.4</vulnerable>
Heimdal is a free implementation of Kerberos 5 that includes a
telnet client program.
Buffer overflow vulnerabilities in the slc_add_reply() and
env_opt_add() functions have been discovered by Gael Delalleau in the
telnet client in Heimdal.
<impact type="normal">
Successful exploitation would require a vulnerable user to connect
to an attacker-controlled host using the telnet client, potentially
executing arbitrary code with the permissions of the user running the
There is no known workaround at this time.
All Heimdal users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.6.4&quot;</code>
<uri link="">CAN-2005-0468</uri>
<uri link="">CAN-2005-0469</uri>
<metadata tag="requester" timestamp="Tue, 26 Apr 2005 20:42:17 +0000">
<metadata tag="submitter" timestamp="Wed, 27 Apr 2005 00:18:43 +0000">
<metadata tag="bugReady" timestamp="Thu, 28 Apr 2005 08:35:57 +0000">