TITLE: SUSE update for heimdal SECUNIA ADVISORY ID: SA19005 VERIFY ADVISORY: http://secunia.com/advisories/19005/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: >From local network OPERATING SYSTEM: UnitedLinux 1.0 http://secunia.com/product/2003/ SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ SuSE Linux Enterprise Server 8 http://secunia.com/product/1171/ SuSE Linux Desktop 1.x http://secunia.com/product/2002/ SUSE Linux 9.2 http://secunia.com/product/4258/ SuSE Linux 9.1 http://secunia.com/product/3473/ DESCRIPTION: SUSE has issued an update for heimdal. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to cause a DoS (Denial of Service). For more information: SA18733 SOLUTION: Apply updated packages. -- x86 Platform -- SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/heimdal-0.6.2-8.6.i586.rpm 3d3d6618cfb387ed34c324d805de0df0 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/heimdal-devel-0.6.2-8.6.i586.rpm 7f885d8e091ce98a3bab1816d4165d3e ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/heimdal-lib-0.6.2-8.6.i586.rpm 021f253a7df8d5ab3caa20b25ea67529 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/heimdal-tools-0.6.2-8.4.i586.rpm 748a213e99d7a2be08eeb4496aecb478 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/heimdal-tools-devel-0.6.2-8.4.i586.rpm 02b9f64f5be3822307102fb9d5842119 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/heimdal-0.6.1rc3-55.21.i586.rpm 235b22414f6129d744f2f62ffccc7962 ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/heimdal-devel-0.6.1rc3-55.21.i586.rpm 5c17e233db8c0b53798cab0d78f1ede1 ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/heimdal-lib-0.6.1rc3-55.21.i586.rpm 17d0afc2004af42ebbeb8d77af724fe5 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/i586/heimdal-lib-32bit-9.1-200602210606.i586.rpm 38c61584528fa24ff04ece6705d21fb3 -- x86-64 Platform -- SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/heimdal-0.6.2-8.6.x86_64.rpm 1f899680ff31945963b55e49df6bcfda ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/heimdal-devel-0.6.2-8.6.x86_64.rpm 1d65e94810c65ccff51b75066569c428 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/heimdal-devel-32bit-9.2-200602211039.x86_64.rpm 068244c514f752985be7c76c5a25418e ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/heimdal-lib-0.6.2-8.6.x86_64.rpm 20b9598b6f5cfaf70de0d3a120f89182 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/heimdal-lib-32bit-9.2-200602211039.x86_64.rpm 93dc79bdf0fc7b7b4cd82a0c3769329e ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/heimdal-tools-0.6.2-8.4.x86_64.rpm 31d1a3e3da2a794850b3e03710d5263c ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/heimdal-tools-devel-0.6.2-8.4.x86_64.rpm 71b87841750ba89979c51c3148d315a0 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/heimdal-0.6.1rc3-55.21.x86_64.rpm 226be123cb085fb50899ac8af82f5bda ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/heimdal-devel-0.6.1rc3-55.21.x86_64.rpm 658aa7a1969078842a0a9368402b83ff ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/heimdal-lib-0.6.1rc3-55.21.x86_64.rpm dafdcf2c26be6576916f5ba6cf3cd9f6 -- Sources -- SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/heimdal-0.6.2-8.6.src.rpm e7333885b6976b490164d28dbc00e905 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/heimdal-0.6.1rc3-55.21.src.rpm ab5d0a61dbfb9df34dfa200bda28d04a ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/heimdal-0.6.1rc3-55.21.src.rpm 0d7fc839fc86c6919931190dbdfbd88e ORIGINAL ADVISORY: http://lists.suse.de/archive/suse-security-announce/2006-Feb/0009.html OTHER REFERENCES: SA18733: http://secunia.com/advisories/18733/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------