USN-511-2: Kerberos vulnerability

Publication date

7 September 2007

Overview

Kerberos vulnerability


Packages

Details

USN-511-1 fixed vulnerabilities in krb5 and librpcsecgss. The fixes were
incomplete, and only reduced the scope of the vulnerability, without fully
solving it. This update fixes the problem.

Original advisory details:

It was discovered that the libraries handling RPCSEC_GSS did not correctly
validate the size of certain packet structures. An unauthenticated remote
user could send a specially crafted request and execute arbitrary code
with root privileges.

USN-511-1 fixed vulnerabilities in krb5 and librpcsecgss. The fixes were
incomplete, and only reduced the scope of the vulnerability, without fully
solving it. This update fixes the problem.

Original advisory details:

It was discovered that the libraries handling RPCSEC_GSS did not correctly
validate the size of certain packet structures. An unauthenticated remote
user could send a specially crafted request and execute arbitrary code
with root privileges.

Update instructions

In general, a standard system upgrade is sufficient to affect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
7.04 feisty librpcsecgss3 –  0.14-2ubuntu1.2
libkadm55 –  1.4.4-5ubuntu3.3
6.10 edgy librpcsecgss2 –  0.13-2ubuntu0.2
libkadm55 –  1.4.3-9ubuntu1.5
6.06 dapper librpcsecgss1 –  0.7-0ubuntu1.2
libkadm55 –  1.4.3-5ubuntu0.6

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›