Debian Security Advisory

DSA-1247-1 libapache-mod-auth-kerb -- heap overflow

Date Reported:
08 Jan 2007
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 400589.
In the Bugtraq database (at SecurityFocus): BugTraq ID 21214.
In Mitre's CVE dictionary: CVE-2006-5989.
More information:

An off-by-one error leading to a heap-based buffer overflow has been identified in libapache-mod-auth-kerb, an Apache module for Kerberos authentication. The error could allow an attacker to trigger an application crash or potentially execute arbitrary code by sending a specially crafted kerberos message.

For the stable distribution (sarge), this problem has been fixed in version 4.996-5.0-rc6-1sarge1.

For the unstable distribution (sid) and the forthcoming stable distribution (etch), this problem has been fixed in version 5.3-1.

We recommend that you upgrade your libapache-mod-auth-kerb package.

Fixed in:

Debian GNU/Linux 3.1 (stable)

Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big endian MIPS:
Little endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.