summaryrefslogtreecommitdiff
blob: 8fc60c481f9d23fba54ca8aedcb1ef26d11a9bc5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200701-14">
  <title>Mod_auth_kerb: Denial of service</title>
  <synopsis>
    Mod_auth_kerb is vulnerable to a buffer overflow possibly allowing a Denial
    of Service.
  </synopsis>
  <product type="ebuild">mod_auth_kerb</product>
  <announced>2007-01-22</announced>
  <revised count="02">2007-12-30</revised>
  <bug>155782</bug>
  <access>remote</access>
  <affected>
    <package name="www-apache/mod_auth_kerb" auto="yes" arch="*">
      <unaffected range="ge">5.0_rc7-r1</unaffected>
      <vulnerable range="lt">5.0_rc7-r1</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Mod_auth_kerb is an Apache authentication module using Kerberos.
    </p>
  </background>
  <description>
    <p>
    Mod_auth_kerb improperly handles component byte encoding in the
    der_get_oid() function, allowing for a buffer overflow to occur if
    there are no components which require more than one byte for encoding.
    </p>
  </description>
  <impact type="normal">
    <p>
    An attacker could try to access a Kerberos protected resource on an
    Apache server with an incorrectly configured service principal and
    crash the server process. It is important to note that this buffer
    overflow is not known to allow for the execution of code.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All mod_auth_kerb users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_auth_kerb-5.0_rc7-r1"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989">CVE-2006-5989</uri>
  </references>
  <metadata tag="requester" timestamp="2007-01-17T22:33:24Z">
    falco
  </metadata>
  <metadata tag="bugReady" timestamp="2007-01-17T22:40:53Z">
    falco
  </metadata>
  <metadata tag="submitter" timestamp="2007-01-18T01:47:32Z">
    shellsage
  </metadata>
</glsa>