USN-408-1: krb5 vulnerability
16 January 2007
krb5 vulnerability
Releases
Details
The server-side portion of Kerberos' RPC library had a memory
management flaw which allowed users of that library to call a function
pointer located in unallocated memory. By doing specially crafted
calls to the kadmind server, a remote attacker could exploit this to
execute arbitrary code with root privileges on the target computer.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 6.10
-
libkrb53
-
1.4.3-9ubuntu1.1
-
libkadm55
-
1.4.3-9ubuntu1.1
Ubuntu 6.06
-
libkrb53
-
1.4.3-5ubuntu0.2
-
libkadm55
-
1.4.3-5ubuntu0.2
In general, a standard system upgrade is sufficient to effect the
necessary changes.