Threat Encyclopedia

MIT.Kerberos.5.KAdminD.klog_vsyslog.Server.Stack.Overflow

description-logoDescription

This indicates an attack attempt against a buffer overflow vulnerability in MIT Kerberos.
The vulnerability is caused by improper boundary checking in the logging function of the Kerberos Administration Server (kadmind). It allows a remote attacker to execute arbitrary code by supplying a specially crafted string.

affected-products-logoAffected Products

Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 LTS
Turbolinux Server 10.0
Turbolinux Desktop 10.0
TurboLinux Personal
TurboLinux Multimedia
Turbolinux Home
Turbolinux Appliance Server 2.0
Trustix Secure Linux 3.0.5
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Operating System Enterprise Server 2.0
TransSoft Broker FTP Server 8.0
Sun Solaris 9
Sun Solaris 8
Sun Solaris 10
SGI ProPack 3.0 SP6
S.u.S.E. SUSE Linux Enterprise Server 10
S.u.S.E. SUSE Linux Enterprise Desktop 10
S.u.S.E. openSUSE 10.2
S.u.S.E. Linux 9.3
S.u.S.E. Linux 10.1
S.u.S.E. Linux 10.0
RedHat Linux Advanced Work Station 2.1
RedHat Enterprise Linux Desktop v.5 client
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1
RedHat Enterprise Linux AS 4
RedHat Enterprise Linux AS 3
RedHat Enterprise Linux AS 2.1
RedHat Desktop 4.0
RedHat Desktop 3.0
Novell KDC (Key Distribution Center) 1.0
MIT Kerberos 5 5.0
MIT Kerberos 5 1.6
MIT Kerberos 5 1.5.1
MIT Kerberos 5 1.5
MIT Kerberos 5 1.4.3
MIT Kerberos 5 1.4.2
MIT Kerberos 5 1.4.1
MIT Kerberos 5 1.4
MIT Kerberos 5 1.3.6
MIT Kerberos 5 1.3.5
MIT Kerberos 5 1.3.4
MIT Kerberos 5 1.3.3
MIT Kerberos 5 1.3.2
MIT Kerberos 5 1.3.1
MIT Kerberos 5 1.3
MIT Kerberos 5 1.2.8
MIT Kerberos 5 1.2.7
MIT Kerberos 5 1.2.6
MIT Kerberos 5 1.2.5
MIT Kerberos 5 1.2.4
MIT Kerberos 5 1.2.3
MIT Kerberos 5 1.2.2
MIT Kerberos 5 1.2.1
MIT Kerberos 5 1.2
MIT Kerberos 5 1.1.1
MIT Kerberos 5 1.1
MIT Kerberos 5 1.0.8
MIT Kerberos 5 1.0.6
MIT Kerberos 5 1.0
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Linux Mandrake 2006.0
MandrakeSoft Linux Mandrake 2007.1
MandrakeSoft Linux Mandrake 2007.0
MandrakeSoft Corporate Server 3.0
MandrakeSoft Corporate Server 4.0
Gentoo Linux
Debian Linux 3.1
Debian Linux 4.0
Apple Mac OS X Server 10.4.9
Apple Mac OS X Server 10.3.9
Apple Mac OS X 10.4.9
Apple Mac OS X 10.3.9

Impact

Arbitrary code execution.

recomended-action-logoRecommended Actions

The vendors have released fixes to address this issue. Please see the following references for more information.
MIT Kerberos 5 1.3.6
MIT Kerberos 5 1.4.1
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/krb5-1.4-16.9.x86_64.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/krb5-1.4.1-5.5.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/krb5-1.4.1-5.5.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-1.4.3-19.10.3.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/krb5-32bit-1.4.1-5.5.x86_64.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/krb5-32bit-9.3-7.3.x86_64.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/krb5-apps-servers-1.4.1-5.5.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/krb5-apps-servers-1.4.1-5.5.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-apps-servers-1.4.3-19.10.3.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/krb5-devel-1.4.1-5.5.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/krb5-devel-1.4.1-5.5.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-devel-1.4.3-19.10.3.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/krb5-devel-32bit-1.4.1-5.5.x86_64.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/krb5-server-1.4.1-5.5.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/krb5-server-1.4.1-5.5.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/krb5-server-1.4.3-19.10.3.i586.rpm
MIT Kerberos 5 1.5.1
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/krb5-1.4.3-19.10.3.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-1.5.1-23.4.i586.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-1.5.1-23.4.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-32bit-1.5.1-23.4.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-apps-servers-1.5.1-23.4.i586.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-apps-servers-1.5.1-23.4.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-devel-1.5.1-23.4.i586.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-devel-1.5.1-23.4.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-devel-32bit-1.5.1-23.4.x86_64.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/krb5-server-1.5.1-23.4.i586.rpm
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/krb5-server-1.5.1-23.4.x86_64.rpm
Sun Solaris 8
Sun Solaris 10.0
Turbolinux Server 10.0
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/x64/Server/10/updates/RPMS/krb5-workstation-1.3.4-22.x86_64.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/krb5-devel-1.2.5-21.i586.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/krb5-devel-1.2.5-21.i586.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/x64/Server/10/updates/RPMS/krb5-workstation-1.3.4-22.x86_64.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/krb5-libs-1.2.5-21.i586.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/x64/Server/10/updates/RPMS/krb5-workstation-1.3.4-22.x86_64.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/krb5-server-1.2.5-21.i586.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/x64/Server/10/updates/RPMS/krb5-workstation-1.3.4-22.x86_64.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/krb5-workstation-1.2.5-21.i586.rpm
ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/x64/Server/10/updates/RPMS/krb5-workstation-1.3.4-22.x86_64.rpm
Apple Mac OS X
http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=13659&cat=1&platform=osx&method=sa/SecUpd2007-004Univ.dmg
http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=13655&cat=1&platform=osx&method=sa/SecUpdSrvr2007-004Pan.dmg
http://wsidecar.apple.com/cgi-bin/nph-reg3rdpty2.pl/product=13657&cat=1&platform=osx&method=sa/SecUpd2007-004Pan.dmg />SGI ProPack 3.0 SP6
Trustix Secure Linux 3.0
Trustix Secure Linux 3.0.5
ftp://ftp.trustix.org/pub/trustix/updates