Full Disclosure mailing list archives
[gentoo-announce] [ GLSA 200504-04 ] mit-krb5: Multiple buffer overflows in telnet client
From: Thierry Carrez <koon () gentoo org>
Date: Wed, 06 Apr 2005 13:50:44 +0200
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200504-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: mit-krb5: Multiple buffer overflows in telnet client
Date: April 06, 2005
Bugs: #87145
ID: 200504-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
The mit-krb5 telnet client is vulnerable to two buffer overflows, which
could allow a malicious telnet server operator to execute arbitrary
code.
Background
==========
The MIT Kerberos 5 implementation provides a command line telnet client
which is used for remote login via the telnet protocol.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-crypt/mit-krb5 < 1.3.6-r2 >= 1.3.6-r2
Description
===========
A buffer overflow has been identified in the env_opt_add() function,
where a response requiring excessive escaping can cause a heap-based
buffer overflow. Another issue has been identified in the
slc_add_reply() function, where a large number of SLC commands can
overflow a fixed size buffer.
Impact
======
Successful exploitation would require a vulnerable user to connect to
an attacker-controlled telnet host, potentially executing arbitrary
code with the permissions of the telnet user on the client.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All mit-krb5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.3.6-r2"
References
==========
[ 1 ] CAN-2005-0468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468
[ 2 ] CAN-2005-0469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469
[ 3 ] MITKRB5-SA-2005-001
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-001-telnet.txt
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200504-04.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [gentoo-announce] [ GLSA 200504-04 ] mit-krb5: Multiple buffer overflows in telnet client Thierry Carrez (Jul 17)
