version 1.9, 2004/05/20 21:05:59 |
version 1.10, 2004/05/30 22:40:51 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<li><a name="kerberos"></a> |
|
<font color="#00900"><strong>022: SECURITY FIX: May 30, |
|
2004</strong></font><br> |
|
A flaw in the Kerberos V <A |
|
HREF="http://www.openbsd.org/cgi-bin/man.cgi?query=kdc">kdc(8)</a> |
|
server could result in the administrator of a Kerberos realm having |
|
the ability to impersonate any principal in any other realm which |
|
has established a cross-realm trust with their realm. The flaw is due to |
|
inadequate checking of the "transited" field in a Kerberos request. For |
|
more details see <A HREF="http://www.pdc.kth.se/heimdal/advisory/2004-04-01/"> |
|
Heimdal's announcement</A>. |
|
<br> |
|
<a |
|
href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/022_kerberos.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
<li><a name="cvs2"></a> |
<li><a name="cvs2"></a> |
<font color="#009000"><strong>021: SECURITY FIX: May 20, |
<font color="#009000"><strong>021: SECURITY FIX: May 20, |
2004</strong></font><br> |
2004</strong></font><br> |