Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA178] DSA-178-1 heimdal


Vulnerability Assessment Details

[DSA178] DSA-178-1 heimdal

Vulnerability Assessment Summary
DSA-178-1 heimdal

Detailed Explanation for this Vulnerability Assessment

The SuSE Security Team has reviewed critical parts of the Heimdal
package such as the kadmind and kdc server. While doing so several
potential buffer overflows and other bugs have been uncovered and
fixed. Remote attackers can probably gain remote root access on
systems without fixes. Since these services usually run on
authentication servers these bugs are considered very serious.
These problems have been fixed in version 0.4e-7.woody.4 for the
current stable distribution (woody), in version 0.2l-7.4 for the old
stable distribution (potato) and version 0.4e-21 for the unstable
distribution (sid).
We recommend that you upgrade your Heimdal packages immediately.


Solution : http://www.debian.org/security/2002/dsa-178
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Dell Latitude E6530 Core i5-3230M 2.6GHz 4GB NO HARD DRIVE 15.6in. Laptop
$0.99
Dell Latitude E6530 Core i5-3230M 2.6GHz 4GB NO HARD DRIVE 15.6in. Laptop pictureFor Oyen Digital 2.5" USB Mini Portable Hard Drive:Leather Case Pouch Holster
$5.99
For Oyen Digital 2.5WD 500GB Black My Passport Ultra Portable External Hard Drive - USB 3.0
$29.99
WD 500GB Black My Passport Ultra Portable External Hard Drive - USB 3.0 picture


Discussions

No Discussions have been posted on this vulnerability.