Multiple integer underflows in the (1) AES and (2) RC4 decryption
functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3
through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause
a denial of service (daemon crash) or possibly execute arbitrary code
by providing ciphertext with a length that is too short to be valid.
Please provide an updated ebuild.
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7
before 1.7.2, and 1.8 alpha, allows remote attackers to cause a
denial of service (assertion failure and daemon crash) via an invalid
(1) AS-REQ or (2) TGS-REQ request.
The oldest version in the tree is now 1.8.3. A B3-rated vulnerability gets a GLSA vote.
GLSA Vote: yes.
Yes, added to glsa for #323525.
This issue was resolved and addressed in
GLSA 201201-13 at http://security.gentoo.org/glsa/glsa-201201-13.xml
by GLSA coordinator Sean Amoss (ackle).