Multiple vulnerabilities in MIT Kerberos 5 could potentially result in remote code execution with root privileges by unauthenticated users.
|Package||app-crypt/mit-krb5 on all architectures|
|Affected versions||< 1.5.2-r3|
|Unaffected versions||>= 1.5.2-r3|
MIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol.
kadmind is affected by multiple vulnerabilities in the RPC library shipped with MIT Kerberos 5. It fails to properly handle zero-length RPC credentials (CVE-2007-2442) and the RPC library can write past the end of the stack buffer (CVE-2007-2443). Furthermore kadmind fails to do proper bounds checking (CVE-2007-2798).
A remote unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code with root privileges.
There is no known workaround at this time.
All MIT Kerberos 5 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2-r3"
July 25, 2007
July 25, 2007: 01