krb5 vulnerabilities

Related Vulnerabilities: CVE-2008-0062   CVE-2008-0063   CVE-2008-0947  

It was discovered that krb5 did not correctly handle certain krb4 requests. An unauthenticated remote attacker could exploit this flaw by sending a specially crafted traffic, which could expose sensitive information, cause a crash, or execute arbitrary code. (CVE-2008-0062, CVE-2008-0063)

A flaw was discovered in the kadmind service’s handling of file descriptors. An unauthenticated remote attacker could send specially crafted requests that would cause a crash, resulting in a denial of service. Only systems with configurations allowing large numbers of open file descriptors were vulnerable. (CVE-2008-0947)

19 March 2008

krb5 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06 LTS

Software Description

  • krb5

Details

It was discovered that krb5 did not correctly handle certain krb4 requests. An unauthenticated remote attacker could exploit this flaw by sending a specially crafted traffic, which could expose sensitive information, cause a crash, or execute arbitrary code. (CVE-2008-0062, CVE-2008-0063)

A flaw was discovered in the kadmind service’s handling of file descriptors. An unauthenticated remote attacker could send specially crafted requests that would cause a crash, resulting in a denial of service. Only systems with configurations allowing large numbers of open file descriptors were vulnerable. (CVE-2008-0947)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.10
libkadm55 - 1.6.dfsg.1-7ubuntu0.1
libkrb53 - 1.6.dfsg.1-7ubuntu0.1
Ubuntu 7.04
libkadm55 - 1.4.4-5ubuntu3.4
libkrb53 - 1.4.4-5ubuntu3.4
Ubuntu 6.10
libkadm55 - 1.4.3-9ubuntu1.6
libkrb53 - 1.4.3-9ubuntu1.6
Ubuntu 6.06 LTS
libkadm55 - 1.4.3-5ubuntu0.7
libkrb53 - 1.4.3-5ubuntu0.7

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References