GLSA 200409-19: Heimdal: ftpd root escalation

Severity:high
Title:Heimdal: ftpd root escalation
Date:09/16/2004
Bugs: #61412
ID:200409-19

Synopsis

Several bugs exist in the Heimdal ftp daemon which could allow a remote attacker to gain root privileges.

Background

Heimdal is an implementation of Kerberos 5.

Affected packages

Package Vulnerable Unaffected Architecture(s)
app-crypt/heimdal < 0.6.3 >= 0.6.3 All supported architectures

Description

Przemyslaw Frasunek discovered several flaws in lukemftpd, which also apply to Heimdal ftpd's out-of-band signal handling code.

Additionally, a potential vulnerability that could lead to Denial of Service by the Key Distribution Center (KDC) has been fixed in this version.

Impact

A remote attacker could be able to run arbitrary code with escalated privileges, which can result in a total compromise of the server.

Workaround

There is no known workaround at this time.

Resolution

All Heimdal users should upgrade to the latest version:

    # emerge sync

    # emerge -pv ">=app-crypt/heimdal-0.6.3"
    # emerge ">=app-crypt/heimdal-0.6.3"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200409-19.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!