version 1.494, 2004/05/27 18:32:06 |
version 1.495, 2004/05/30 22:40:51 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<li><a name="kerberos"></a> |
|
<font color="#00900"><strong>008: SECURITY FIX: May 30, |
|
2004</strong></font><br> |
|
A flaw in the Kerberos V <A |
|
HREF="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a> |
|
server could result in the administrator of a Kerberos realm having |
|
the ability to impersonate any principal in any other realm which |
|
has established a cross-realm trust with their realm. The flaw is due to |
|
inadequate checking of the "transited" field in a Kerberos request. For |
|
more details see <A HREF="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/"> |
|
Heimdal's announcement</A>. |
|
<br> |
|
<a |
|
href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/009_kerberos.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
<li><a name="xdm"></a> |
<li><a name="xdm"></a> |
<font color="#00900"><strong>008: SECURITY FIX: May 26, |
<font color="#00900"><strong>008: SECURITY FIX: May 26, |
2004</strong></font><br> |
2004</strong></font><br> |