Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-012: krb


Vulnerability Assessment Details

RHSA-2005-012: krb

Vulnerability Assessment Summary
Check for the version of the krb packages

Detailed Explanation for this Vulnerability Assessment


Updated Kerberos (krb5) packages that correct buffer overflow and temporary
file bugs are now available for Red Hat Enterprise Linux.

Kerberos is a networked authentication system that uses a trusted third
party (a KDC) to authenticate clients and servers to each other.

A heap based buffer overflow bug was found in the administration library of
Kerberos 1.3.5 and earlier. This bug could permit an authenticated remote
attacker to execute arbitrary commands on a realm's master Kerberos KDC.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-1189 to this issue.

Additionally a temporary file bug was found in the Kerberos krb5-send-pr
program. It is possible that a possible hacker could create a temporary file
that would permit an arbitrary file to be overwritten which the victim has
write access to. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0971 to this issue.

All users of krb5 should upgrade to these updated packages, which contain
backported security patches to resolve these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-012.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

TRANSITION NETWORKS M/GE-ISW-SFP-01-PD 10/100/1000BASETX TO 1000BASE
$357.11
TRANSITION NETWORKS M/GE-ISW-SFP-01-PD 10/100/1000BASETX TO 1000BASE pictureTRANSITION NETWORKS TN-CWDM-100LX-1350 SFP CC 100BASE-LX 1350NM SM LC
$872.07
TRANSITION NETWORKS TN-CWDM-100LX-1350 SFP CC 100BASE-LX 1350NM SM LC pictureALLIED TELESIS BOX AT-SP10TW1 1M TWINAX CABLE SFP
$140.87
ALLIED TELESIS BOX AT-SP10TW1 1M TWINAX CABLE SFP pictureCISCO REFRESH GLC-LH-SMD-RF REFURB 1000BASE LX LH SFP
$431.23
CISCO REFRESH GLC-LH-SMD-RF REFURB 1000BASE LX LH SFP picture


Discussions

No Discussions have been posted on this vulnerability.