Integer underflow flaws, leading to heap-based corruption, were found in the way MIT Kerberos Key Distribution Center (KDC) used to decrypt ciphertexts encrypted with Advanced Encryption Standard (AES) and ARCFOUR (RC4) encryption algorithms. A remote KDC client could provide a specially-crafted AES or RC4 encrypted ciphertext(s), which once processed by a central KDC would lead to denial of service (KDC crash or abort) or, potentially, to KDC relying authentication services compromise or arbitrary code execution with the privileges of the KDC centre. Upstream advisory (not available yet): -------------------------------------- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt Upstream patches (not available yet): ------------------------------------- http://web.mit.edu/kerberos/advisories/2009-004-patch_1.7.txt http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt
Public now via: http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2009-004.txt
This issue has been addressed in following products: Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 4.7 Z Stream Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 5.2 Z Stream Red Hat Enterprise Linux 5.3.Z - Server Only Via RHSA-2010:0029 https://rhn.redhat.com/errata/RHSA-2010-0029.html
krb5-1.7-18.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
krb5-1.6.3-23.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.