Package: librpcsecgss
Version: 0.14-3
Severity: grave
Tags: security

Hi,
a CVE has been issued against this package:
CVE-2007-3999:
Stack-based buffer overflow in the svcauth_gss_validate function in
lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5)
1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and
other applications that use krb5, allows remote attackers to cause a denial of
service (daemon crash) and probably execute arbitrary code via a long string in
an RPC message.

CVE-2007-4743
The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC
library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos
administration daemon (kadmind) and other applications that use krb5, does not
correctly check the buffer length in some environments and architectures, which
might allow remote attackers to conduct a buffer overflow attack.

Please include the CVE id (CVE-2007-4743) in the changelog if you fix this bug.
I have an NMU ready for this bug, please ping me if I have your ok to upload, 
otherwise I will wait 2 days on reaction.
Kind regards
Nico
-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpNr2ZEZGmhE.pgp
Description: PGP signature

Reply via email to