Gentoo: heimdal krb4 cryptographic weakness
Summary
GENTOO LINUX SECURITY ANNOUNCEMENT 200305-09
heimdal suffers from the same vulnerability as mit-krb5 does, hence the identical advisory.
- - From advisory: "A cryptographic weakness in version 4 of the Kerberos protocol allows an attacker to use a chosen-plaintext attack to impersonate any principal in a realm. Additional cryptographic weaknesses in the krb4 implementation included in the MIT krb5 distribution permit the use of cut-and-paste attacks to fabricate krb4 tickets for unauthorized client principals if triple-DES keys are used to key krb4 services. These attacks can subvert a site's entire Kerberos authentication infrastructure."
Read the full advisory at mit
SOLUTION
It is recommended that all Gentoo Linux users who are running app-crypt/heimdal upgrade to heimdal-0.6 as follows
emerge sync emerge heimdal emerge clean
aliz@gentoo.org - GnuPG key is available at
Resolution
References
Availability
Concerns
Background