USN-587-1: Kerberos vulnerabilities

Publication date

19 March 2008

Overview

Kerberos vulnerabilities


Packages

Details

It was discovered that krb5 did not correctly handle certain krb4
requests. An unauthenticated remote attacker could exploit this flaw
by sending a specially crafted traffic, which could expose sensitive
information, cause a crash, or execute arbitrary code. (CVE-2008-0062,
CVE-2008-0063)

A flaw was discovered in the kadmind service's handling of file
descriptors. An unauthenticated remote attacker could send specially
crafted requests that would cause a crash, resulting in a denial of
service. Only systems with configurations allowing large numbers of
open file descriptors were vulnerable. (CVE-2008-0947)

It was discovered that krb5 did not correctly handle certain krb4
requests. An unauthenticated remote attacker could exploit this flaw
by sending a specially crafted traffic, which could expose sensitive
information, cause a crash, or execute arbitrary code. (CVE-2008-0062,
CVE-2008-0063)

A flaw was discovered in the kadmind service's handling of file
descriptors. An unauthenticated remote attacker could send specially
crafted requests that would cause a crash, resulting in a denial of
service. Only systems with configurations allowing large numbers of
open file descriptors were vulnerable. (CVE-2008-0947)

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
7.10 gutsy libkrb53 –  1.6.dfsg.1-7ubuntu0.1
libkadm55 –  1.6.dfsg.1-7ubuntu0.1
7.04 feisty libkrb53 –  1.4.4-5ubuntu3.4
libkadm55 –  1.4.4-5ubuntu3.4
6.10 edgy libkrb53 –  1.4.3-9ubuntu1.6
libkadm55 –  1.4.3-9ubuntu1.6
6.06 dapper libkrb53 –  1.4.3-5ubuntu0.7
libkadm55 –  1.4.3-5ubuntu0.7

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›