secalert received a message from the MIT Kerberos Development Team detailing a vulnerability. The MIT Kerberos 5 administration library (libkadm5srv) contains a heap buffer overflow in password history handling code which could be exploited to execute arbitrary code on a Key Distribution Center (KDC) host. The overflow occurs during a password change of a principal with a certain password history state. An administrator must have performed a certain password policy change in order to create the vulnerable state. There is currently no patch for this issue. I'll attach one as soon as it becomes available. The MIT team wants to realease their update sometimes around 2004-12-21 since this issue is technically public (we are however treating it as embargoed). This issue should also affect FC2.
removing embargo
*** Bug 143443 has been marked as a duplicate of this bug. ***
CAN-2004-1189 Probably Affects: FC2 [#142904:NEW] -> 2004-563 20041221 CAN-2004-1189 Probably Affects: FC3 [#142904:NEW] -> 2004-564 20041221