Lucene search

K
gentooGentoo FoundationGLSA-200506-24
HistoryJun 29, 2005 - 12:00 a.m.

Heimdal: Buffer overflow vulnerabilities

2005-06-2900:00:00
Gentoo Foundation
security.gentoo.org
12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.019 Low

EPSS

Percentile

88.5%

Background

Heimdal is a free implementation of Kerberos 5 that includes a telnetd server.

Description

It has been reported that the “getterminaltype” function of Heimdal’s telnetd server is vulnerable to buffer overflows.

Impact

An attacker could exploit this vulnerability to execute arbitrary code with the permission of the telnetd server program.

Workaround

There is no known workaround at this time.

Resolution

All users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.6.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-crypt/heimdal< 0.6.5UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.019 Low

EPSS

Percentile

88.5%