MIT Kerberos 5: Multiple vulnerabilities — GLSA 201201-13

Multiple vulnerabilities have been found in MIT Kerberos 5, the most severe of which may allow remote execution of arbitrary code.

Affected packages

app-crypt/mit-krb5 on all architectures
Affected versions < 1.9.2-r1
Unaffected versions >= 1.9.2-r1

Background

MIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol.

Description

Multiple vulnerabilities have been discovered in MIT Kerberos 5. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker may be able to execute arbitrary code with the privileges of the administration daemon or the Key Distribution Center (KDC) daemon, cause a Denial of Service condition, or possibly obtain sensitive information. Furthermore, a remote attacker may be able to spoof Kerberos authorization, modify KDC responses, forge user data messages, forge tokens, forge signatures, impersonate a client, modify user-visible prompt text, or have other unspecified impact.

Workaround

There is no known workaround at this time.

Resolution

All MIT Kerberos 5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.9.2-r1"
 

References

Release date
January 23, 2012

Latest revision
January 23, 2012: 1

Severity
high

Exploitable
remote

Bugzilla entries