krb5 vulnerability

Related Vulnerabilities: CVE-2004-1189  

Michael Tautschnig discovered a possible buffer overflow in the add_to_history() function in the MIT Kerberos 5 implementation. Performing a password change did not properly track the password policy’s history count and the maximum number of keys. This could cause an array overflow and may have allowed authenticated users (not necessarily one with administrative privileges) to execute arbitrary code on the KDC host, compromising an entire Kerberos realm.

The problem can be corrected by updating your system to the following package versions:

10 January 2005

krb5 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 4.10

Software Description

Details

Michael Tautschnig discovered a possible buffer overflow in the add_to_history() function in the MIT Kerberos 5 implementation. Performing a password change did not properly track the password policy’s history count and the maximum number of keys. This could cause an array overflow and may have allowed authenticated users (not necessarily one with administrative privileges) to execute arbitrary code on the KDC host, compromising an entire Kerberos realm.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 4.10
krb5-admin-server
krb5-kdc
libkadm55
libkrb53

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

References