Heimdal: Buffer overflow vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200504-28 / Heimdal
||April 28, 2005
||April 28, 2005: 01
All supported architectures
Buffer overflow vulnerabilities have been found in the telnet client in
Heimdal which could lead to execution of arbitrary code.
Heimdal is a free implementation of Kerberos 5 that includes a
telnet client program.
Buffer overflow vulnerabilities in the slc_add_reply() and
env_opt_add() functions have been discovered by Gael Delalleau in the
telnet client in Heimdal.
Successful exploitation would require a vulnerable user to connect
to an attacker-controlled host using the telnet client, potentially
executing arbitrary code with the permissions of the user running the
There is no known workaround at this time.
All Heimdal users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.6.4"