Bugzilla – Bug 75256
VUL-0: CVE-2005-0469: heimdal's telnet client seem to be vulnerable to the recent bugs too
Last modified: 2021-11-04 16:06:58 UTC
Hello Vladimir, it looks like the telnet client shipped as part of the heimdal package contains the same code as our ordinary telnet client. This code is buggy. Have a look at bug #66128 .
I used the patch telnet-bsd-1.0-temp-increase+slc-env-overflow.diff packages for sles8, sles9 and 8.2-9.2 are submitted.
SM-Tracker-748
Vladimir, can you make an update for 9.3 too please? I'll submit the patchinfo files when you are done.
heimdal is not in 9.3
submitted patchinfo files for SLES/SLD: /work/src/done/PATCHINFO/patchinfo.heimdal /work/src/done/PATCHINFO/patchinfo-sld.heimdal Will wait with box until 9.3 package was submitted...
"edit_patchinfo -p" and "is_maintained -b" show 9.3... they must be wrong then... ok.
submitted patchinfo file: /work/src/done/PATCHINFO/patchinfo-box.heimdal What is the 9.3 replacement for heimdal?
krb5 ... and it contains the fixes already I think (last minute addition).
Yes, krb5 on 9.3 has this patch. #> rpm -qp --changelog /work/CDs/all/full-9.3-i386/suse/i586/krb5-apps-clients.rpm | head * Fr Mär 18 2005 - mc@suse.de - fixed not running converter script [#72854] * Do Mär 17 2005 - mc@suse.de - Fix CAN-2005-0469: Multiple Telnet Client slc_add_reply() Buffer Overflow - Fix CAN-2005-0468: Multiple Telnet Client env_opt_add() Buffer Overflow
Michael, is this a patch from bug# 66128 or a patch from the kerberos folks? I quickly compared the patches and the krb5 patch looks different from the patches we have in our bugzilla.
Ludwig already told me that it was the patch from the kerberos advisory.
Correct, the patch was provided by the MIT people.
The SLEC heimdal version is unpatched. Please submit a fixed package.
sorry, package is submitted
updates approved and released for this round
the onformation leak bug is still open. CRD 14 juni, 1pm EST
CVE-2005-0469: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)