Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-012: krb


Vulnerability Assessment Details

RHSA-2005-012: krb

Vulnerability Assessment Summary
Check for the version of the krb packages

Detailed Explanation for this Vulnerability Assessment


Updated Kerberos (krb5) packages that correct buffer overflow and temporary
file bugs are now available for Red Hat Enterprise Linux.

Kerberos is a networked authentication system that uses a trusted third
party (a KDC) to authenticate clients and servers to each other.

A heap based buffer overflow bug was found in the administration library of
Kerberos 1.3.5 and earlier. This bug could permit an authenticated remote
attacker to execute arbitrary commands on a realm's master Kerberos KDC.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-1189 to this issue.

Additionally a temporary file bug was found in the Kerberos krb5-send-pr
program. It is possible that a possible hacker could create a temporary file
that would permit an arbitrary file to be overwritten which the victim has
write access to. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0971 to this issue.

All users of krb5 should upgrade to these updated packages, which contain
backported security patches to resolve these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-012.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R820 bare bones, good working before removal of CPUs and RAMs
$729.0
DELL POWEREDGE R820 bare bones, good working before removal of CPUs and RAMs  pictureDell PowerEdge R720 2x E5-2690 v2 3.0Ghz 10 Core 32GB 8x 3TB 7.2K SAS H710
$6550.0
Dell PowerEdge R720 2x E5-2690 v2 3.0Ghz 10 Core 32GB 8x 3TB 7.2K SAS H710 pictureDELL PE R620 2x 2.90Ghz E5-2690 8C 192GB 3x 600GB SSD 5x 1TB SAS 90-Day Warranty
$3386.25
DELL PE R620 2x 2.90Ghz E5-2690 8C 192GB 3x 600GB SSD 5x 1TB SAS 90-Day Warranty pictureDell PowerEdge R710 Server 2x 2.66GHz Quad Core Xeon | 48gb | DVD-RW | PC3-8500
$199.99
Dell PowerEdge R710 Server 2x 2.66GHz Quad Core Xeon | 48gb | DVD-RW | PC3-8500 picture


Discussions

No Discussions have been posted on this vulnerability.