Gentoo Logo

Heimdal: Kerberos 4 buffer overflow in kadmin


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200405-23 / Heimdal
Release Date May 27, 2004
Latest Revision May 27, 2004: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-crypt/heimdal < 0.6.2 >= 0.6.2 All supported architectures

Related bugreports: #50208


A possible buffer overflow in the Kerberos 4 component of Heimdal has been discovered.

2.  Impact Information


Heimdal is a free implementation of Kerberos.


A buffer overflow was discovered in kadmind, a server for administrative access to the Kerberos database.


By sending a specially formatted message to kadmind, a remote attacker may be able to crash kadmind causing a denial of service, or execute arbitrary code with the permissions of the kadmind process.

3.  Resolution Information


For a temporary workaround, providing you do not require Kerberos 4 support, you may turn off Kerberos 4 kadmin by running kadmind with the --no-kerberos4 option.


All Heimdal users should upgrade to the latest stable version:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=app-crypt/heimdal-0.6.2"
# emerge ">=app-crypt/heimdal-0.6.2"

4.  References


Page updated May 27, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.