Multiple vulnerabilities in MIT Kerberos 5 could potentially result in remote code execution with root privileges by unauthenticated users.
Package | app-crypt/mit-krb5 on all architectures |
---|---|
Affected versions | < 1.5.2-r3 |
Unaffected versions | >= 1.5.2-r3 |
MIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol.
kadmind is affected by multiple vulnerabilities in the RPC library shipped with MIT Kerberos 5. It fails to properly handle zero-length RPC credentials (CVE-2007-2442) and the RPC library can write past the end of the stack buffer (CVE-2007-2443). Furthermore kadmind fails to do proper bounds checking (CVE-2007-2798).
A remote unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code with root privileges.
There is no known workaround at this time.
All MIT Kerberos 5 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2-r3"
Release date
July 25, 2007
Latest revision
July 25, 2007: 01
Severity
high
Exploitable
remote
Bugzilla entries