Package: heimdal-servers
Severity: critical
Tags: security

The following is from Secunia advisory SA15718 which may be found at
http://secunia.com/advisories/15718/


DESCRIPTION:
A vulnerability has been reported in Heimdal, which potentially can
be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error in telnetd within
the "getterminaltype()" function when processing the terminal type
received from a telnet client.

Successful exploitation may allow execution of arbitrary code.

SOLUTION:
Update to version 0.6.5 or 0.7.
ftp://ftp.pdc.kth.se/pub/heimdal/src/

PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.

ORIGINAL ADVISORY:
http://www.pdc.kth.se/heimdal/advisory/2005-06-20/



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-1-k7
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to