Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the krb packages
Detailed Explanation for this Vulnerability Assessment
Updated kerberos packages fix a number of vulnerabilities found in MIT
Kerberos is a network authentication system. The MIT Kerberos team
released an advisory describing a number of vulnerabilities that affect the
kerberos packages shipped by Red Hat.
An integer signedness error in the ASN.1 decoder before version 1.2.5
permits remote attackers to cause a denial of service via a large unsigned
data element length, which is later used as a negative value. The Common
Vulnerabilities and Exposures project has assigned the name CVE-2002-0036
to this issue.
The Key Distribution Center (KDC) before version 1.2.5 permits remote,
authenticated, attackers to cause a denial of service (crash) on KDCs
within the same realm via a certain protocol request that:
- causes a null pointer dereference (CVE-2003-0058).
- causes the KDC to corrupt its heap (CVE-2003-0082).
A vulnerability in Kerberos before version 1.2.3 permits users from
one realm to impersonate users in other realms that have the same
inter-realm keys (CVE-2003-0059).
The MIT advisory for these issues also mentions format string
vulnerabilities in the logging routines (CVE-2003-0060). Previous versions
of the kerberos packages from Red Hat already contain fixes for this issue.
Vulnerabilities have been found in the implementation of support for
triple-DES keys in the implementation of the Kerberos IV authentication
protocol included in MIT Kerberos (CVE-2003-0139).
Vulnerabilities have been found in the Kerberos IV authentication protocol
which permit a possible hacker with knowledge of a cross-realm key that is shared
with another realm to impersonate any principal in that realm to any
service in that realm. This vulnerability can only be closed by disabling
cross-realm authentication in Kerberos IV (CVE-2003-0138).
Vulnerabilities have been found in the RPC library used by the kadmin
service in Kerberos 5. A faulty length check in the RPC library exposes
kadmind to an integer overflow which can be used to crash kadmind
All users of Kerberos are advised to upgrade to these errata packages,
which disable cross-realm authentication by default for Kerberos IV and
which contain backported patches to correct these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2003-052.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|NEW Linux Red Hat 6.2 Deluxe Computer Software Windows Server PC SEALED
|Dell PowerEdge T410 Tower Server Intel Xeon 16GB RAM 6x1TB HDD Linux
|FAST HP Z820 (2x) Xeon E5-2650 2.0GHz 64GB RAM 2TB HDD Nvidia Q6000 -Linux
|HP ProLiant ML150 G6 Quad Xeon E5530 2.4GHz 24GB 4x 500GB DVDRW LINUX
No Discussions have been posted on this vulnerability.