SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   MIT
(Mandrake Issues Fix) Kerberos libkadm5srv Heap Overflow in Processing Password History May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012668
SecurityTracker URL:  http://securitytracker.com/id/1012668
CVE Reference:   CVE-2004-1189   (Links to External Site)
Date:  Dec 23 2004
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): krb5-1.3.5 and prior versions
Description:   A buffer overflow vulnerability was reported in Kerberos 5 in the libkadm5srv administration library. A remote user may be able to execute arbitrary code on an affected Key Distribution Center (KDC) host.

The vendor reported that there is a heap overflow in the password history handling code. If an administrator has performed a certain password policy change, the system may be affected.

The flaw resides in the add_to_history() function in 'src/lib/kadm5/srv/svr_principal.c', where an array index may be set to an out-of-bounds position, causing a password history to be written past the end of an array.

Michael Tautschnig is credited with reporting this flaw.

Impact:   A remote user may be able to execute arbitrary code on the target KDC system in certain cases.
Solution:   Mandrake has released a fix.

Mandrakelinux 10.0:
5259ecd533fc0565920fbe8aec40cd3d 10.0/RPMS/ftp-client-krb5-1.3-6.4.100mdk.i586.rpm
51bec69363fe219e4eec6b73bc1b802d 10.0/RPMS/ftp-server-krb5-1.3-6.4.100mdk.i586.rpm
b8d00e7aecf213f9ae4ef5a67451adc2 10.0/RPMS/krb5-server-1.3-6.4.100mdk.i586.rpm
d4043c430c172f66c9593d14e4399730 10.0/RPMS/krb5-workstation-1.3-6.4.100mdk.i586.rpm
746d023be57fe5ddb0dbacac26fc8ebd 10.0/RPMS/libkrb51-1.3-6.4.100mdk.i586.rpm
6a4e0e161543ecb0e0b5c5bfe011dfcf 10.0/RPMS/libkrb51-devel-1.3-6.4.100mdk.i586.rpm
3eaa8cff9b16a32db93ec1e895a01998 10.0/RPMS/telnet-client-krb5-1.3-6.4.100mdk.i586.rpm
ffbe1fbcea8c618ba2bffaaae0bcedf0 10.0/RPMS/telnet-server-krb5-1.3-6.4.100mdk.i586.rpm
16d8b9d874e834149065db8bca4161dc 10.0/SRPMS/krb5-1.3-6.4.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
f3e89b08aff5e719ee32b17b450df7e6 amd64/10.0/RPMS/ftp-client-krb5-1.3-6.4.100mdk.amd64.rpm
8fa797c90b0336f8b8650d0fed32c166 amd64/10.0/RPMS/ftp-server-krb5-1.3-6.4.100mdk.amd64.rpm
9cebf80fcfaefb123c98a31b6bd279ca amd64/10.0/RPMS/krb5-server-1.3-6.4.100mdk.amd64.rpm
a52c18d67660dc19e370b9690315339b amd64/10.0/RPMS/krb5-workstation-1.3-6.4.100mdk.amd64.rpm
e605f5765eddd4eaa1e6974f07723c73 amd64/10.0/RPMS/lib64krb51-1.3-6.4.100mdk.amd64.rpm
2559fd1f6695b03224862f472cfc4c7d amd64/10.0/RPMS/lib64krb51-devel-1.3-6.4.100mdk.amd64.rpm
3f8d481a719a231dee5298c9081c37e8 amd64/10.0/RPMS/telnet-client-krb5-1.3-6.4.100mdk.amd64.rpm
6d767b9d0acb2d9028b56bfce19b4468 amd64/10.0/RPMS/telnet-server-krb5-1.3-6.4.100mdk.amd64.rpm
16d8b9d874e834149065db8bca4161dc amd64/10.0/SRPMS/krb5-1.3-6.4.100mdk.src.rpm

Mandrakelinux 10.1:
10e1a075457e7c4afa70825c83e86d76 10.1/RPMS/ftp-client-krb5-1.3.4-2.1.101mdk.i586.rpm
8798a2f601f24b2751a4d465d4f98ca2 10.1/RPMS/ftp-server-krb5-1.3.4-2.1.101mdk.i586.rpm
78475d53992fbf48c761fc29f96b8535 10.1/RPMS/krb5-server-1.3.4-2.1.101mdk.i586.rpm
ecd91754869b7200ee8b0dc09577750a 10.1/RPMS/krb5-workstation-1.3.4-2.1.101mdk.i586.rpm
5d792e412854a5e4dabf6be549489896 10.1/RPMS/libkrb53-1.3.4-2.1.101mdk.i586.rpm
bb7086eb3c1f2e87b70b270a83e42e54 10.1/RPMS/libkrb53-devel-1.3.4-2.1.101mdk.i586.rpm
333e3c7c4d764ebb32ee8ff34a1b7fa1 10.1/RPMS/telnet-client-krb5-1.3.4-2.1.101mdk.i586.rpm
42e03d7080fdbd9839de8b65c85b1b68 10.1/RPMS/telnet-server-krb5-1.3.4-2.1.101mdk.i586.rpm
0ea19d548852538b26066f75b7ef280d 10.1/SRPMS/krb5-1.3.4-2.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
aaf71808c6ad43416f008af590620930 x86_64/10.1/RPMS/ftp-client-krb5-1.3.4-2.1.101mdk.x86_64.rpm
c6726c1b5c1c2278c5634b856da7c3d3 x86_64/10.1/RPMS/ftp-server-krb5-1.3.4-2.1.101mdk.x86_64.rpm
a16f8dd425a3cbcd3d73a77a39363deb x86_64/10.1/RPMS/krb5-server-1.3.4-2.1.101mdk.x86_64.rpm
7926914181c2183b8953f9e923eb9f69 x86_64/10.1/RPMS/krb5-workstation-1.3.4-2.1.101mdk.x86_64.rpm
439c0603bb36786883009595b4b2c346 x86_64/10.1/RPMS/lib64krb53-1.3.4-2.1.101mdk.x86_64.rpm
0fb403b8d2d7258f947b8e518218dbcd x86_64/10.1/RPMS/lib64krb53-devel-1.3.4-2.1.101mdk.x86_64.rpm
7e0829d328491a5173ac145cb9211ab9 x86_64/10.1/RPMS/telnet-client-krb5-1.3.4-2.1.101mdk.x86_64.rpm
529984cdea656be82188dc7b8e807789 x86_64/10.1/RPMS/telnet-server-krb5-1.3.4-2.1.101mdk.x86_64.rpm
0ea19d548852538b26066f75b7ef280d x86_64/10.1/SRPMS/krb5-1.3.4-2.1.101mdk.src.rpm

Corporate Server 2.1:
b6b07e10c2a5c1dfec9894c48eaa59fc corporate/2.1/RPMS/ftp-client-krb5-1.2.5-1.8.C21mdk.i586.rpm
0840970f8d38eb91807435379918da4e corporate/2.1/RPMS/ftp-server-krb5-1.2.5-1.8.C21mdk.i586.rpm
f5f79c6cb56232bc2d513902824eaca1 corporate/2.1/RPMS/krb5-devel-1.2.5-1.8.C21mdk.i586.rpm
0388d0814b2fd7899e804264471ec38d corporate/2.1/RPMS/krb5-libs-1.2.5-1.8.C21mdk.i586.rpm
647c93e42a069205ccf6c085c0d5337e corporate/2.1/RPMS/krb5-server-1.2.5-1.8.C21mdk.i586.rpm
3756c27aa8fde4e81bb35bc6896f5d2b corporate/2.1/RPMS/krb5-workstation-1.2.5-1.8.C21mdk.i586.rpm
37c17167f8ef7b5e4eeceb60a17a3804 corporate/2.1/RPMS/telnet-client-krb5-1.2.5-1.8.C21mdk.i586.rpm
dbac3b9e2bc0d60af9c5d9c2e55e53df corporate/2.1/RPMS/telnet-server-krb5-1.2.5-1.8.C21mdk.i586.rpm
847feb907c3022f0279f6cec8a1ab28d corporate/2.1/SRPMS/krb5-1.2.5-1.8.C21mdk.src.rpm

Corporate Server 2.1/x86_64:
f1489d64518efaf2eaa73d1d7b69343c x86_64/corporate/2.1/RPMS/ftp-client-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
a161fb6d0cb8b045491ec64117b413c6 x86_64/corporate/2.1/RPMS/ftp-server-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
9ec1d7ac348640bd1d464a58b5390f04 x86_64/corporate/2.1/RPMS/krb5-devel-1.2.5-1.8.C21mdk.x86_64.rpm
aa42b2e5934d95cde48ffb705e55fb62 x86_64/corporate/2.1/RPMS/krb5-libs-1.2.5-1.8.C21mdk.x86_64.rpm
8fa79e2d839c4d0f2dba664029b8e64b x86_64/corporate/2.1/RPMS/krb5-server-1.2.5-1.8.C21mdk.x86_64.rpm
052a4fde53a2a066a1bbd001b4b20742 x86_64/corporate/2.1/RPMS/krb5-workstation-1.2.5-1.8.C21mdk.x86_64.rpm
a8b3bbbc1a6f9425a33df27a7e317ab7 x86_64/corporate/2.1/RPMS/telnet-client-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
407ef805887d30a942b82ce37e2db63d x86_64/corporate/2.1/RPMS/telnet-server-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
847feb907c3022f0279f6cec8a1ab28d x86_64/corporate/2.1/SRPMS/krb5-1.2.5-1.8.C21mdk.src.rpm

Mandrakelinux 9.2:
ceb891e96c0c18c775f0775335d7daed 9.2/RPMS/ftp-client-krb5-1.3-3.4.92mdk.i586.rpm
737826c759a0366b3f1e1a5e08ba68e7 9.2/RPMS/ftp-server-krb5-1.3-3.4.92mdk.i586.rpm
e88cbf35407e09b34987440d41fc46c0 9.2/RPMS/krb5-server-1.3-3.4.92mdk.i586.rpm
5572f323cc19bf3df6bbd4619200e6ce 9.2/RPMS/krb5-workstation-1.3-3.4.92mdk.i586.rpm
f39fd4c4e2722b75af178efb5c53270c 9.2/RPMS/libkrb51-1.3-3.4.92mdk.i586.rpm
1e2fc6b6750057bc2c86109843472e93 9.2/RPMS/libkrb51-devel-1.3-3.4.92mdk.i586.rpm
a9f3fe282ce9633ea7633a9ef1ee5e8c 9.2/RPMS/telnet-client-krb5-1.3-3.4.92mdk.i586.rpm
fd56a352d88b0a4366a694983226dcf0 9.2/RPMS/telnet-server-krb5-1.3-3.4.92mdk.i586.rpm
003b0c283b689682d975b64cb0abb8ef 9.2/SRPMS/krb5-1.3-3.4.92mdk.src.rpm

Mandrakelinux 9.2/AMD64:
ca86cfd5de3e31eca88d33040a4fbbcf amd64/9.2/RPMS/ftp-client-krb5-1.3-3.4.92mdk.amd64.rpm
fdc91c66742b8c234f7ec625b446b754 amd64/9.2/RPMS/ftp-server-krb5-1.3-3.4.92mdk.amd64.rpm
20da9152c854ee5882fe0b1a84c6b938 amd64/9.2/RPMS/krb5-server-1.3-3.4.92mdk.amd64.rpm
66b41ebc03f3b945fe16eb7683f113a7 amd64/9.2/RPMS/krb5-workstation-1.3-3.4.92mdk.amd64.rpm
d2c69d6dce82a1118c83aa0558c45656 amd64/9.2/RPMS/lib64krb51-1.3-3.4.92mdk.amd64.rpm
39d72a1fb616203e710e962c16f4c3f2 amd64/9.2/RPMS/lib64krb51-devel-1.3-3.4.92mdk.amd64.rpm
a7903a38ba17da110a4493ddf61c5f41 amd64/9.2/RPMS/telnet-client-krb5-1.3-3.4.92mdk.amd64.rpm
bdb463f1f851819b2098ff5f0f7305ea amd64/9.2/RPMS/telnet-server-krb5-1.3-3.4.92mdk.amd64.rpm
003b0c283b689682d975b64cb0abb8ef amd64/9.2/SRPMS/krb5-1.3-3.4.92mdk.src.rpm

Vendor URL:  web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Mandriva/Mandrake)
Underlying OS Comments:  10.0, 10.1, 9.2, Corporate Server 2.1

Message History:   This archive entry is a follow-up to the message listed below.
Dec 20 2004 Kerberos libkadm5srv Heap Overflow in Processing Password History May Let Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [Full-Disclosure] MDKSA-2004:156 - Updated krb5 packages fix buffer


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           krb5
 Advisory ID:            MDKSA-2004:156
 Date:                   December 22nd, 2004

 Affected versions:	 10.0, 10.1, 9.2, Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 Michael Tautschnig discovered a heap buffer overflow in the history
 handling code of libkadm5srv which could be exploited by an
 authenticated user to execute arbitrary code on a Key Distribution
 Center (KDC) server.
 
 The updated packages have been patched to prevent this problem.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1189
  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 5259ecd533fc0565920fbe8aec40cd3d  10.0/RPMS/ftp-client-krb5-1.3-6.4.100mdk.i586.rpm
 51bec69363fe219e4eec6b73bc1b802d  10.0/RPMS/ftp-server-krb5-1.3-6.4.100mdk.i586.rpm
 b8d00e7aecf213f9ae4ef5a67451adc2  10.0/RPMS/krb5-server-1.3-6.4.100mdk.i586.rpm
 d4043c430c172f66c9593d14e4399730  10.0/RPMS/krb5-workstation-1.3-6.4.100mdk.i586.rpm
 746d023be57fe5ddb0dbacac26fc8ebd  10.0/RPMS/libkrb51-1.3-6.4.100mdk.i586.rpm
 6a4e0e161543ecb0e0b5c5bfe011dfcf  10.0/RPMS/libkrb51-devel-1.3-6.4.100mdk.i586.rpm
 3eaa8cff9b16a32db93ec1e895a01998  10.0/RPMS/telnet-client-krb5-1.3-6.4.100mdk.i586.rpm
 ffbe1fbcea8c618ba2bffaaae0bcedf0  10.0/RPMS/telnet-server-krb5-1.3-6.4.100mdk.i586.rpm
 16d8b9d874e834149065db8bca4161dc  10.0/SRPMS/krb5-1.3-6.4.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 f3e89b08aff5e719ee32b17b450df7e6  amd64/10.0/RPMS/ftp-client-krb5-1.3-6.4.100mdk.amd64.rpm
 8fa797c90b0336f8b8650d0fed32c166  amd64/10.0/RPMS/ftp-server-krb5-1.3-6.4.100mdk.amd64.rpm
 9cebf80fcfaefb123c98a31b6bd279ca  amd64/10.0/RPMS/krb5-server-1.3-6.4.100mdk.amd64.rpm
 a52c18d67660dc19e370b9690315339b  amd64/10.0/RPMS/krb5-workstation-1.3-6.4.100mdk.amd64.rpm
 e605f5765eddd4eaa1e6974f07723c73  amd64/10.0/RPMS/lib64krb51-1.3-6.4.100mdk.amd64.rpm
 2559fd1f6695b03224862f472cfc4c7d  amd64/10.0/RPMS/lib64krb51-devel-1.3-6.4.100mdk.amd64.rpm
 3f8d481a719a231dee5298c9081c37e8  amd64/10.0/RPMS/telnet-client-krb5-1.3-6.4.100mdk.amd64.rpm
 6d767b9d0acb2d9028b56bfce19b4468  amd64/10.0/RPMS/telnet-server-krb5-1.3-6.4.100mdk.amd64.rpm
 16d8b9d874e834149065db8bca4161dc  amd64/10.0/SRPMS/krb5-1.3-6.4.100mdk.src.rpm

 Mandrakelinux 10.1:
 10e1a075457e7c4afa70825c83e86d76  10.1/RPMS/ftp-client-krb5-1.3.4-2.1.101mdk.i586.rpm
 8798a2f601f24b2751a4d465d4f98ca2  10.1/RPMS/ftp-server-krb5-1.3.4-2.1.101mdk.i586.rpm
 78475d53992fbf48c761fc29f96b8535  10.1/RPMS/krb5-server-1.3.4-2.1.101mdk.i586.rpm
 ecd91754869b7200ee8b0dc09577750a  10.1/RPMS/krb5-workstation-1.3.4-2.1.101mdk.i586.rpm
 5d792e412854a5e4dabf6be549489896  10.1/RPMS/libkrb53-1.3.4-2.1.101mdk.i586.rpm
 bb7086eb3c1f2e87b70b270a83e42e54  10.1/RPMS/libkrb53-devel-1.3.4-2.1.101mdk.i586.rpm
 333e3c7c4d764ebb32ee8ff34a1b7fa1  10.1/RPMS/telnet-client-krb5-1.3.4-2.1.101mdk.i586.rpm
 42e03d7080fdbd9839de8b65c85b1b68  10.1/RPMS/telnet-server-krb5-1.3.4-2.1.101mdk.i586.rpm
 0ea19d548852538b26066f75b7ef280d  10.1/SRPMS/krb5-1.3.4-2.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 aaf71808c6ad43416f008af590620930  x86_64/10.1/RPMS/ftp-client-krb5-1.3.4-2.1.101mdk.x86_64.rpm
 c6726c1b5c1c2278c5634b856da7c3d3  x86_64/10.1/RPMS/ftp-server-krb5-1.3.4-2.1.101mdk.x86_64.rpm
 a16f8dd425a3cbcd3d73a77a39363deb  x86_64/10.1/RPMS/krb5-server-1.3.4-2.1.101mdk.x86_64.rpm
 7926914181c2183b8953f9e923eb9f69  x86_64/10.1/RPMS/krb5-workstation-1.3.4-2.1.101mdk.x86_64.rpm
 439c0603bb36786883009595b4b2c346  x86_64/10.1/RPMS/lib64krb53-1.3.4-2.1.101mdk.x86_64.rpm
 0fb403b8d2d7258f947b8e518218dbcd  x86_64/10.1/RPMS/lib64krb53-devel-1.3.4-2.1.101mdk.x86_64.rpm
 7e0829d328491a5173ac145cb9211ab9  x86_64/10.1/RPMS/telnet-client-krb5-1.3.4-2.1.101mdk.x86_64.rpm
 529984cdea656be82188dc7b8e807789  x86_64/10.1/RPMS/telnet-server-krb5-1.3.4-2.1.101mdk.x86_64.rpm
 0ea19d548852538b26066f75b7ef280d  x86_64/10.1/SRPMS/krb5-1.3.4-2.1.101mdk.src.rpm

 Corporate Server 2.1:
 b6b07e10c2a5c1dfec9894c48eaa59fc  corporate/2.1/RPMS/ftp-client-krb5-1.2.5-1.8.C21mdk.i586.rpm
 0840970f8d38eb91807435379918da4e  corporate/2.1/RPMS/ftp-server-krb5-1.2.5-1.8.C21mdk.i586.rpm
 f5f79c6cb56232bc2d513902824eaca1  corporate/2.1/RPMS/krb5-devel-1.2.5-1.8.C21mdk.i586.rpm
 0388d0814b2fd7899e804264471ec38d  corporate/2.1/RPMS/krb5-libs-1.2.5-1.8.C21mdk.i586.rpm
 647c93e42a069205ccf6c085c0d5337e  corporate/2.1/RPMS/krb5-server-1.2.5-1.8.C21mdk.i586.rpm
 3756c27aa8fde4e81bb35bc6896f5d2b  corporate/2.1/RPMS/krb5-workstation-1.2.5-1.8.C21mdk.i586.rpm
 37c17167f8ef7b5e4eeceb60a17a3804  corporate/2.1/RPMS/telnet-client-krb5-1.2.5-1.8.C21mdk.i586.rpm
 dbac3b9e2bc0d60af9c5d9c2e55e53df  corporate/2.1/RPMS/telnet-server-krb5-1.2.5-1.8.C21mdk.i586.rpm
 847feb907c3022f0279f6cec8a1ab28d  corporate/2.1/SRPMS/krb5-1.2.5-1.8.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 f1489d64518efaf2eaa73d1d7b69343c  x86_64/corporate/2.1/RPMS/ftp-client-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
 a161fb6d0cb8b045491ec64117b413c6  x86_64/corporate/2.1/RPMS/ftp-server-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
 9ec1d7ac348640bd1d464a58b5390f04  x86_64/corporate/2.1/RPMS/krb5-devel-1.2.5-1.8.C21mdk.x86_64.rpm
 aa42b2e5934d95cde48ffb705e55fb62  x86_64/corporate/2.1/RPMS/krb5-libs-1.2.5-1.8.C21mdk.x86_64.rpm
 8fa79e2d839c4d0f2dba664029b8e64b  x86_64/corporate/2.1/RPMS/krb5-server-1.2.5-1.8.C21mdk.x86_64.rpm
 052a4fde53a2a066a1bbd001b4b20742  x86_64/corporate/2.1/RPMS/krb5-workstation-1.2.5-1.8.C21mdk.x86_64.rpm
 a8b3bbbc1a6f9425a33df27a7e317ab7  x86_64/corporate/2.1/RPMS/telnet-client-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
 407ef805887d30a942b82ce37e2db63d  x86_64/corporate/2.1/RPMS/telnet-server-krb5-1.2.5-1.8.C21mdk.x86_64.rpm
 847feb907c3022f0279f6cec8a1ab28d  x86_64/corporate/2.1/SRPMS/krb5-1.2.5-1.8.C21mdk.src.rpm

 Mandrakelinux 9.2:
 ceb891e96c0c18c775f0775335d7daed  9.2/RPMS/ftp-client-krb5-1.3-3.4.92mdk.i586.rpm
 737826c759a0366b3f1e1a5e08ba68e7  9.2/RPMS/ftp-server-krb5-1.3-3.4.92mdk.i586.rpm
 e88cbf35407e09b34987440d41fc46c0  9.2/RPMS/krb5-server-1.3-3.4.92mdk.i586.rpm
 5572f323cc19bf3df6bbd4619200e6ce  9.2/RPMS/krb5-workstation-1.3-3.4.92mdk.i586.rpm
 f39fd4c4e2722b75af178efb5c53270c  9.2/RPMS/libkrb51-1.3-3.4.92mdk.i586.rpm
 1e2fc6b6750057bc2c86109843472e93  9.2/RPMS/libkrb51-devel-1.3-3.4.92mdk.i586.rpm
 a9f3fe282ce9633ea7633a9ef1ee5e8c  9.2/RPMS/telnet-client-krb5-1.3-3.4.92mdk.i586.rpm
 fd56a352d88b0a4366a694983226dcf0  9.2/RPMS/telnet-server-krb5-1.3-3.4.92mdk.i586.rpm
 003b0c283b689682d975b64cb0abb8ef  9.2/SRPMS/krb5-1.3-3.4.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 ca86cfd5de3e31eca88d33040a4fbbcf  amd64/9.2/RPMS/ftp-client-krb5-1.3-3.4.92mdk.amd64.rpm
 fdc91c66742b8c234f7ec625b446b754  amd64/9.2/RPMS/ftp-server-krb5-1.3-3.4.92mdk.amd64.rpm
 20da9152c854ee5882fe0b1a84c6b938  amd64/9.2/RPMS/krb5-server-1.3-3.4.92mdk.amd64.rpm
 66b41ebc03f3b945fe16eb7683f113a7  amd64/9.2/RPMS/krb5-workstation-1.3-3.4.92mdk.amd64.rpm
 d2c69d6dce82a1118c83aa0558c45656  amd64/9.2/RPMS/lib64krb51-1.3-3.4.92mdk.amd64.rpm
 39d72a1fb616203e710e962c16f4c3f2  amd64/9.2/RPMS/lib64krb51-devel-1.3-3.4.92mdk.amd64.rpm
 a7903a38ba17da110a4493ddf61c5f41  amd64/9.2/RPMS/telnet-client-krb5-1.3-3.4.92mdk.amd64.rpm
 bdb463f1f851819b2098ff5f0f7305ea  amd64/9.2/RPMS/telnet-server-krb5-1.3-3.4.92mdk.amd64.rpm
 003b0c283b689682d975b64cb0abb8ef  amd64/9.2/SRPMS/krb5-1.3-3.4.92mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFByZr7mqjQ0CJFipgRAs0MAJ4jHxa8A2NdcHHOp7azY/vD5vl8OwCaAoWe
FoyKkZrOqyhva6vHv65q+80=
=yLnq
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC