Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 9728 - app-crypt/krb5
Summary: app-crypt/krb5
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: x86 Linux
: Lowest critical (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2002-10-26 18:08 UTC by Daniel Ahlberg (RETIRED)
Modified: 2003-02-04 19:42 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Daniel Ahlberg (RETIRED) gentoo-dev 2002-10-26 18:08:49 UTC
MIT krb5 Security Advisory 2002-002 [updated]

2002-10-25 [updated; revision history at end]

Original Release Date: 2002-10-22

Topic: Buffer overflow in kadmind4

Severity: CRITICAL - Remote user can gain root access to KDC host.

SUMMARY
=======

A stack buffer overflow in the implementation of the Kerberos v4
compatibility administration daemon (kadmind4) in the MIT krb5
distribution can be exploited to gain unauthorized root access to a
KDC host.  The attacker does not need to authenticate to the daemon to
successfully perform this attack.  At least one exploit is known to
exist in the wild, and at least one attacker is reasonably competent
at cleaning up traces of intrusion.

The kadmind4 supplied with MIT krb5 is intended for use in sites that
require compatibility with legacy administrative clients; sites that
do not have this requirement are not likely to be running this daemon.

IMPACT
======

A remote attacker can execute arbitrary code on the KDC with the
privileges of the user running kadmind4 (usually root).  This can lead
to compromise of the Kerberos database.