Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA765] DSA-765-1 heimdal


Vulnerability Assessment Details

[DSA765] DSA-765-1 heimdal

Vulnerability Assessment Summary
DSA-765-1 heimdal

Detailed Explanation for this Vulnerability Assessment

GaŽl Delalleau discovered a buffer overflow in the handling of the
LINEMODE suboptions in telnet clients. Heimdal, a free implementation
of Kerberos 5, also contains such a client. This can lead to the
execution of arbitrary code when connected to a malicious server.
For the old stable distribution (woody) this problem has been fixed in
version 0.4e-7.woody.11.
For the stable distribution (sarge) this problem has been fixed in
version 0.6.3-10.
For the unstable distribution (sid) this problem has been fixed in
version 0.6.3-10.
We recommend that you upgrade your heimdal package.


Solution : http://www.debian.org/security/2005/dsa-765
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Samsung 840 EVO 1TB 2.5-Inch SATA Internal SSD
$0.99
Samsung 840 EVO 1TB 2.5-Inch SATA Internal SSD pictureUSB Charger,Hizek Quick Charge 3.0 50W 8-Port Fast Charging Station for Samsung
$46.04
USB Charger,Hizek Quick Charge 3.0 50W 8-Port Fast Charging Station for Samsung pictureCompatible ML-6060 Toner Cartridge - Samsung
$50.0
Compatible ML-6060 Toner Cartridge - Samsung  pictureSamsung PM830 Series 128GB MLC SATA 6Gbps 2.5" SSD MZ7PC128HAFU-000D1
$37.0
Samsung PM830 Series 128GB MLC SATA 6Gbps 2.5


Discussions

No Discussions have been posted on this vulnerability.