English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 148472 CVE descriptions
and 72306 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2004-22
   http://www.turbolinux.co.jp/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date : 16 Sep 2004
 Last revised           : 12 Nov 2004

 Package : krb5

 Summary : Double-free vulnerabilities allow abritrary code execution

 More information :
    Kerberos V5 is a trusted-third-party network authentication system,
    which can improve your network's security by eliminating the insecure
    practice of cleartext passwords.

    Double-free vulnerabilities exist in MIT Kerberos 5.

 Impact :
    Allows remote attackers to execute arbitrary code.

 Affected Products :
    - Turbolinux Appliance Server 1.0 Hosting Edition
    - Turbolinux Appliance Server 1.0 Workgroup Edition
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop
    - Turbolinux 8 Server

 Solution :
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Desktop, Turbolinux 10 F...]
 # zabom -u krb5-devel krb5-libs krb5-server krb5-server

 [other]
 # turbopkg
 or
 # zabom update krb5-devel krb5-libs krb5-server krb5-server
 ---------------------------------------------


 <Turbolinux Appliance Server 1.0 Hosting Edition>

   Source Packages
   Size : MD5

   krb5-1.2.5-15.src.rpm
      5517434 ed8f49991f1522edb5bc0a70d8e784c1

   Binary Packages
   Size : MD5

   krb5-devel-1.2.5-15.i586.rpm
       538565 4c2a133f8020ce1d496f2a98358f2905
   krb5-libs-1.2.5-15.i586.rpm
       638443 6f6b12674fcad5cb54f7217710fdab5a

 <Turbolinux Appliance Server 1.0 Workgroup Edition>

   Source Packages
   Size : MD5

   krb5-1.2.5-15.src.rpm
      5517434 5e5d2206a82188bbc18c4d64d21d79cf

   Binary Packages
   Size : MD5

   krb5-devel-1.2.5-15.i586.rpm
       538347 8c5da942c8cce6f96c262e8bb2f01c99
   krb5-libs-1.2.5-15.i586.rpm
       638600 4caa141b2c6d7a0ab412aaa3436215ea

 <Turbolinux 10 Desktop, Turbolinux 10 F...>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/krb5-1.2.5-15.src.rpm
      5517434 3b81c31d80f99fa91c3e647fd327337c

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/krb5-devel-1.2.5-15.i586.rpm
       577318 cb7ef4827cee8789de73c05ee5bf7e73
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/krb5-libs-1.2.5-15.i586.rpm
       343425 774777d19c467b4a155592193df36acb
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/krb5-server-1.2.5-15.i586.rpm
       601753 7b73e1c17a36992c2f24079981d53d91
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/krb5-workstation-1.2.5-15.i586.rpm
       591287 58c3d0ac67c604394c9ac8177231472e

 <Turbolinux 8 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/krb5-1.2.5-15.src.rpm
      5517434 79a0e8ebe4646d2439dff38c61c4697c

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/krb5-devel-1.2.5-15.i586.rpm
       576177 51e8f5b891bcc849581adbde8260ed61
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/krb5-libs-1.2.5-15.i586.rpm
       639231 472a5684e98f05f441735814414d1602
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/krb5-server-1.2.5-15.i586.rpm
       602771 4efde019247ee9e0f07f449424089741
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/krb5-workstation-1.2.5-15.i586.rpm
       602058 217b68738b9ce8f7a443cbf210336f66


 References:

 Kerberos: The Network Authentication Protocol
   [MIT krb5 Security Advisory 2004-002]
   http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt
   [MIT krb5 Security Advisory 2004-003]
   http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-003-asn1.txt

 CVE
   [CAN-2004-0642]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0642
   [CAN-2004-0643]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0643
   [CAN-2004-0644]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0644
   [CAN-2004-0772]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0772


 --------------------------------------------------------------------------
 Revision History
    16 Sep 2004 Initial release
    12 Nov 2004 deleted krb5-server, krb5-workstation from
                Turbolinux Appliance Server 1.0 Hosting Edition and Workgroup Edition
 --------------------------------------------------------------------------

 Copyright(C) 2004 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFBlFxiK0LzjOqIJMwRAnTrAJ0X2x7kOLGEX95x4fyH+eh1jqp8vQCeKYSY
X5BxfRqrAPuE1PsXSda5jhI=
=kR33
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.