|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-0469: heimdal's telnet client seem to be vulnerable to the recent bugs too | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Biege <thomas> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | mc, nadvornik |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-0469: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Thomas Biege
2005-03-30 14:46:11 UTC
I used the patch telnet-bsd-1.0-temp-increase+slc-env-overflow.diff packages for sles8, sles9 and 8.2-9.2 are submitted. SM-Tracker-748 Vladimir, can you make an update for 9.3 too please? I'll submit the patchinfo files when you are done. heimdal is not in 9.3 submitted patchinfo files for SLES/SLD: /work/src/done/PATCHINFO/patchinfo.heimdal /work/src/done/PATCHINFO/patchinfo-sld.heimdal Will wait with box until 9.3 package was submitted... "edit_patchinfo -p" and "is_maintained -b" show 9.3... they must be wrong then... ok. submitted patchinfo file: /work/src/done/PATCHINFO/patchinfo-box.heimdal What is the 9.3 replacement for heimdal? krb5 ... and it contains the fixes already I think (last minute addition). Yes, krb5 on 9.3 has this patch. #> rpm -qp --changelog /work/CDs/all/full-9.3-i386/suse/i586/krb5-apps-clients.rpm | head * Fr Mär 18 2005 - mc@suse.de - fixed not running converter script [#72854] * Do Mär 17 2005 - mc@suse.de - Fix CAN-2005-0469: Multiple Telnet Client slc_add_reply() Buffer Overflow - Fix CAN-2005-0468: Multiple Telnet Client env_opt_add() Buffer Overflow Michael, is this a patch from bug# 66128 or a patch from the kerberos folks? I quickly compared the patches and the krb5 patch looks different from the patches we have in our bugzilla. Ludwig already told me that it was the patch from the kerberos advisory. Correct, the patch was provided by the MIT people. The SLEC heimdal version is unpatched. Please submit a fixed package. sorry, package is submitted updates approved and released for this round the onformation leak bug is still open. CRD 14 juni, 1pm EST CVE-2005-0469: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) |