MDVSA-2009:098 -- Mandriva krb5ID: oval:org.secpod.oval:def:300824 | Date: (C)2012-01-07 (M)2024-02-15 |
Class: PATCH | Family: unix |
Multiple vulnerabilities has been found and corrected in krb5: The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 1.5 through 1.6.3 allows remote attackers to cause a denial of service and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read . The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 before 1.6.4 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer . The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic . The updated packages have been patched to correct these issues. Update: krb5 packages for Mandriva Linux Corporate Server 3 and 4 are not affected by CVE-2009-0844 and CVE-2009-0845
Platform: |
Mandriva Linux 2009.0 |
Mandriva Linux 2008.1 |