-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                     ESB-2004.0396 -- RHSA-2004:236-01
                      Updated krb5 packages available
                               10 June 2004

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                krb5
Publisher:              Red Hat
Operating System:       Red Hat Enterprise Linux AS/ES/WS 2.1
                        Red Hat Linux Advanced Workstation 2.1
                        Red Hat Enterprise Linux AS/ES/WS 3
                        Red Hat Desktop version 3
                        Linux variants
Impact:                 Root Compromise
Access Required:        Remote
CVE Names:              CAN-2004-0523

Ref:                    ESB-2004.0378

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated krb5 packages available
Advisory ID:       RHSA-2004:236-01
Issue date:        2004-06-09
Updated on:        2004-06-09
Product:           Red Hat Enterprise Linux
Keywords:          krb5 auth_to_local MITKRB5-SA-2004-001
Cross references:  
Obsoletes:         RHBA-2004:208
CVE Names:         CAN-2004-0523
- - ---------------------------------------------------------------------

1. Topic:

Updated Kerberos 5 (krb5) packages which correct buffer overflows in the
krb5_aname_to_localname function are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, ppc64, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Kerberos is a network authentication system.

Bugs have been fixed in the krb5_aname_to_localname library function.
Specifically, buffer overflows were possible for all Kerberos versions up
to and including 1.3.3. The krb5_aname_to_localname function translates a
Kerberos principal name to a local account name, typically a UNIX username.
This function is frequently used when performing authorization checks.

If configured with mappings from particular Kerberos principals to
particular UNIX user names, certain functions called by
krb5_aname_to_localname will not properly check the lengths of buffers
used to store portions of the principal name.  If configured to map
principals to user names using rules, krb5_aname_to_localname would
consistently write one byte past the end of a buffer allocated from the
heap.  The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0523 to this issue.

Only configurations which enable the explicit mapping or rules-based
mapping functionality of krb5_aname_to_localname() are vulnerable.
These configurations are not the default.

Users of Kerberos are advised to upgrade to these erratum packages which
contain backported security patches to correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

125001 - CAN-2004-0523 MIT Kerberos 5: buffer overflows in krb5_aname_to_localname

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/krb5-1.2.2-27.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.i386.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/krb5-1.2.2-27.src.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/krb5-1.2.2-27.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/krb5-1.2.2-27.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-server-1.2.2-27.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.2-27.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/krb5-1.2.7-24.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.i386.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.ia64.rpm

ppc:
Available from Red Hat Network: krb5-devel-1.2.7-24.ppc.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.ppc.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.ppc.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.ppc.rpm

ppc64:
Available from Red Hat Network: krb5-libs-1.2.7-24.ppc64.rpm

s390:
Available from Red Hat Network: krb5-devel-1.2.7-24.s390.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.s390.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.s390.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.s390.rpm

s390x:
Available from Red Hat Network: krb5-devel-1.2.7-24.s390x.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.s390x.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.s390.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.s390x.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.s390x.rpm

x86_64:
Available from Red Hat Network: krb5-devel-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/krb5-1.2.7-24.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.i386.rpm

x86_64:
Available from Red Hat Network: krb5-devel-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/krb5-1.2.7-24.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.i386.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.ia64.rpm

x86_64:
Available from Red Hat Network: krb5-devel-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/krb5-1.2.7-24.src.rpm

i386:
Available from Red Hat Network: krb5-devel-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.i386.rpm

ia64:
Available from Red Hat Network: krb5-devel-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.ia64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.ia64.rpm

x86_64:
Available from Red Hat Network: krb5-devel-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-libs-1.2.7-24.i386.rpm
Available from Red Hat Network: krb5-server-1.2.7-24.x86_64.rpm
Available from Red Hat Network: krb5-workstation-1.2.7-24.x86_64.rpm



7. Verification:

MD5 sum                          Package Name
- - --------------------------------------------------------------------------
3d02725d161f02d01ff86ef7b7182183 krb5-1.2.2-27.src.rpm
af63a6f3ffd39b302760c87fcad4266e krb5-1.2.7-24.src.rpm
3bc07d36495e716f02a27744853e2076 krb5-devel-1.2.2-27.i386.rpm
168a5eeb5037510af1fbb5ec62228466 krb5-devel-1.2.2-27.ia64.rpm
6d6afcdbf68274e0e17d1febc8b4cbbc krb5-devel-1.2.7-24.i386.rpm
a5fb83189f17bce330979183c1adf258 krb5-devel-1.2.7-24.ia64.rpm
a9b7d213f7063478841d3fbb81815812 krb5-devel-1.2.7-24.ppc.rpm
8f328bf8938322b57587819a3f28ff46 krb5-devel-1.2.7-24.s390.rpm
16acea014099bc8bc972e4c93190a202 krb5-devel-1.2.7-24.s390x.rpm
579783ee3caafeb629c76e1f17fb6b36 krb5-devel-1.2.7-24.x86_64.rpm
3f3d659e6a39aadf75b0d199a1785075 krb5-libs-1.2.2-27.i386.rpm
e6d7cd9a27c55e3e764556595d6d9b3a krb5-libs-1.2.2-27.ia64.rpm
348a5fe692a60dd6fb53cf926ca1a67a krb5-libs-1.2.7-24.i386.rpm
a836bc89fab21b87c2671a38376060c8 krb5-libs-1.2.7-24.ia64.rpm
dc8412ef9ff911cb3c0203dda9757acd krb5-libs-1.2.7-24.ppc.rpm
d5e94f1dd96b7b9adf0063d8bf3f6a68 krb5-libs-1.2.7-24.ppc64.rpm
3ebad1dba1ef6be35c42944ec0e3b374 krb5-libs-1.2.7-24.s390.rpm
4dadbf79a6f406bc219d8794c20f61e0 krb5-libs-1.2.7-24.s390x.rpm
c61c3221a56d5603e6e4e1ec9ddaf380 krb5-libs-1.2.7-24.x86_64.rpm
ef93cca932fb036e44fb3aeaf5f72a7a krb5-server-1.2.2-27.i386.rpm
5e756234b865a2a6539c29fe0baeab88 krb5-server-1.2.2-27.ia64.rpm
0f31a82ed0046a3fbe50bf1d4ac05948 krb5-server-1.2.7-24.i386.rpm
f882e7d17c37f242afb32aaf7c34c0b9 krb5-server-1.2.7-24.ia64.rpm
ee76eced813fce598c895c75743f1a34 krb5-server-1.2.7-24.ppc.rpm
23d8d0c047508e5598fd6417e461c61b krb5-server-1.2.7-24.s390.rpm
86c9d73665948640d90915f4665ae2b0 krb5-server-1.2.7-24.s390x.rpm
e9cef6200f186a4118da041cf56fe6f7 krb5-server-1.2.7-24.x86_64.rpm
2a2743270d3fe988624d55a0e254f380 krb5-workstation-1.2.2-27.i386.rpm
fa5fdeef9726022e788d5ff02a9e2c49 krb5-workstation-1.2.2-27.ia64.rpm
54deedb77213b98088601db3c91c5136 krb5-workstation-1.2.7-24.i386.rpm
9e2b7bad03c8f0c4dbda226aad2edaa7 krb5-workstation-1.2.7-24.ia64.rpm
a8f191915064110e4f3c072f831aca0b krb5-workstation-1.2.7-24.ppc.rpm
ff7ec2de33ee8084384be8ae53d285ab krb5-workstation-1.2.7-24.s390.rpm
83b35af5e4d0f049d88fd70d6b2693c4 krb5-workstation-1.2.7-24.s390x.rpm
750e1126b693966e4207546e2469e20b krb5-workstation-1.2.7-24.x86_64.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/team/key.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0523

9. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAxwixXlSAg2UNWIIRArTVAJ9Y70Y8DAsUtk5W6RuFvnLpaclVnACeJJGI
BRCn6CVrJgm7p8GD4rowae8=
=QT9H
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQMfWbCh9+71yA2DNAQJH+AP/VTLLSSrTYtTxZEESrYaXGf/2/Dfewk0w
zucLpDqo5+Ad5Hj00v4dlBNutq6GKt9AgA/EBKMT9N21n7yfZ7u/Fr1pHA/UzTro
dRtU70D+V4iA7d3nkMpQpPYKT6L9DBVPSmeSpvJ3SojvMFI0/ror1c5K1nW895DC
o7gZQDL1jGs=
=IkBb
-----END PGP SIGNATURE-----