aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCy Schubert <cy@FreeBSD.org>2013-06-04 04:45:22 +0000
committerCy Schubert <cy@FreeBSD.org>2013-06-04 04:45:22 +0000
commitfd0bfa7a6d9bcd5e08d8238c45af05264a52330a (patch)
tree3825c1d50fa4066a0aba38a2f1e94dfc94630298
parent94888aad5ccc4cfe3429b401354a6a23bfcef05f (diff)
Update krb5 1.11.2 --> 1.11.3.
This is a bugfix release. * Fix a UDP ping-pong vulnerability in the kpasswd (password changing) service. [CVE-2002-2443] * Improve interoperability with some Windows native PKINIT clients. Security: CVE-2002-2443
Notes
Notes: svn path=/head/; revision=319823
-rw-r--r--security/krb5/Makefile2
-rw-r--r--security/krb5/distinfo4
-rw-r--r--security/vuxml/vuln.xml32
3 files changed, 35 insertions, 3 deletions
diff --git a/security/krb5/Makefile b/security/krb5/Makefile
index 84e994ca5d39..57a7e28ed634 100644
--- a/security/krb5/Makefile
+++ b/security/krb5/Makefile
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= krb5
-PORTVERSION= 1.11.2
+PORTVERSION= 1.11.3
CATEGORIES= security
MASTER_SITES= http://web.mit.edu/kerberos/dist/${PORTNAME}/${PORTVERSION:C/^[0-9]*\.[0-9]*/&X/:C/X\.[0-9]*$//:C/X//}/
DISTNAME= ${PORTNAME}-${PORTVERSION}-signed
diff --git a/security/krb5/distinfo b/security/krb5/distinfo
index d150cb50ecb6..203e595f6d7b 100644
--- a/security/krb5/distinfo
+++ b/security/krb5/distinfo
@@ -1,2 +1,2 @@
-SHA256 (krb5-1.11.2-signed.tar) = f0373295fb320b9702468eb0df33397e7278326ec1681a8c6037cc53cb0120a5
-SIZE (krb5-1.11.2-signed.tar) = 11673600
+SHA256 (krb5-1.11.3-signed.tar) = 9abd94bb94a70996da0f8d90408957154bb543271b097e86c63eb33e5f5751b5
+SIZE (krb5-1.11.3-signed.tar) = 11673600
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5496d9640f7b..31f44575cacd 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,38 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e3f64457-cccd-11e2-af76-206a8a720317">
+ <topic>krb5 -- UDP ping-pong vulnerability in the kpasswd (password changing) service. [CVE-2002-2443]</topic>
+ <affects>
+ <package>
+ <name>krb5</name>
+ <range><le>1.11.2</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>No advisory has been released yet.</p>
+ <blockquote cite="http://web.mit.edu/kerberos/www/krb5-1.11/">
+ <p>schpw.c in the kpasswd service in kadmind in MIT Kerberos 5
+ (aka krb5) before 1.11.3 does not properly validate UDP packets
+ before sending responses, which allows remote attackers to cause
+ a denial of service (CPU and bandwidth consumption) via a forged
+ packet that triggers a communication loop, as demonstrated by
+ krb_pingpong.nasl, a related issue to CVE-1999-0103.
+ [CVE-2002-2443].</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2002-2443</cvename>
+ <url>http://web.mit.edu/kerberos/www/krb5-1.11/</url>
+ </references>
+ <dates>
+ <discovery>2013-05-10</discovery>
+ <entry>2013-06-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0bf376b7-cc6b-11e2-a424-14dae938ec40">
<topic>net/openafs -- buffer overflow</topic>
<affects>