Security flaws in Kerberos implementations.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 People running Kerberos should be aware of the recent remotely exploitable security flaws in kth-krb, Heimdal and MIT-krb5. At least one exploit already exists. http://www.pdc.kth.se/kth-krb/ http://www.pdc.kth.se/heimdal/ http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt I assume SuSE will release a fix for Heimdal? Fred - -- Fred A. Miller Systems Administrator Cornell Univ. Press Services fm@cupserv.org, www.cupserv.org - --- SuSE Linux v8.0 Pro, KMail 1.4.3--- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Using GnuPG with Netscape - http://enigmail.mozdev.org iEYEARECAAYFAj25VoMACgkQB9vk4ichYXfO5wCcCe/MvrPVn50XkoUZ8Gye8XYy RlAAmwY7cyHKoEj7HlkqBXKoRurxV0G4 =nmWJ -----END PGP SIGNATURE-----
participants (1)
-
Fred A. Miller