USN-58-1: MIT Kerberos server vulnerability
10 January 2005
MIT Kerberos server vulnerability
Releases
Details
Michael Tautschnig discovered a possible buffer overflow in the
add_to_history() function in the MIT Kerberos 5 implementation.
Performing a password change did not properly track the password
policy’s history count and the maximum number of keys. This could
cause an array overflow and may have allowed authenticated users (not
necessarily one with administrative privileges) to execute arbitrary
code on the KDC host, compromising an entire Kerberos realm.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 4.10
-
krb5-kdc
-
-
krb5-admin-server
-
-
libkrb53
-
-
libkadm55
-
In general, a standard system update will make all the necessary changes.