Integer underflow flaws, leading to heap-based corruption, were found
in the way MIT Kerberos Key Distribution Center (KDC) used to
decrypt ciphertexts encrypted with Advanced Encryption Standard (AES)
and ARCFOUR (RC4) encryption algorithms. A remote KDC client
could provide a specially-crafted AES or RC4 encrypted ciphertext(s),
which once processed by a central KDC would lead to denial of
service (KDC crash or abort) or, potentially, to KDC relying
authentication services compromise or arbitrary code execution
with the privileges of the KDC centre.
Upstream advisory (not available yet):
--------------------------------------
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt
Upstream patches (not available yet):
-------------------------------------
http://web.mit.edu/kerberos/advisories/2009-004-patch_1.7.txthttp://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt
This issue has been addressed in following products:
Red Hat Enterprise Linux 3
Red Hat Enterprise Linux 4
Red Hat Enterprise Linux 4.7 Z Stream
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 5.2 Z Stream
Red Hat Enterprise Linux 5.3.Z - Server Only
Via RHSA-2010:0029 https://rhn.redhat.com/errata/RHSA-2010-0029.html
Comment 13Fedora Update System
2010-01-14 01:20:57 UTC
krb5-1.7-18.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
Comment 14Fedora Update System
2010-01-14 01:22:36 UTC
krb5-1.6.3-23.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.