MIT Kerberos 5: Arbitrary remote code execution — GLSA 200707-11

Multiple vulnerabilities in MIT Kerberos 5 could potentially result in remote code execution with root privileges by unauthenticated users.

Affected packages

app-crypt/mit-krb5 on all architectures
Affected versions < 1.5.2-r3
Unaffected versions >= 1.5.2-r3

Background

MIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol.

Description

kadmind is affected by multiple vulnerabilities in the RPC library shipped with MIT Kerberos 5. It fails to properly handle zero-length RPC credentials (CVE-2007-2442) and the RPC library can write past the end of the stack buffer (CVE-2007-2443). Furthermore kadmind fails to do proper bounds checking (CVE-2007-2798).

Impact

A remote unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code with root privileges.

Workaround

There is no known workaround at this time.

Resolution

All MIT Kerberos 5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2-r3"

References

Release date
July 25, 2007

Latest revision
July 25, 2007: 01

Severity
high

Exploitable
remote

Bugzilla entries