Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> klogind overflow


Vulnerability Assessment Details

klogind overflow

Vulnerability Assessment Summary
Attempts to overflow klogind

Detailed Explanation for this Vulnerability Assessment

The remote klogind seems to be vulnerable to a buffer
overflow which may also affect other kerberos related
programs.

A possible hacker may use this to gain a root shell
on this host


Solution : See Cert Advisory CA-2000-06
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Renaud Deraison

Cables, Connectors

Dell SNPT192HC/4G 4GB DDR3 PC3-10600E ECC UDIMM Server Memory RAM
$34.63
Dell SNPT192HC/4G 4GB DDR3 PC3-10600E ECC UDIMM Server Memory RAM pictureDell Poweredge R630 1U | 1x Intel Xeon E5-2640 v3 32GB RAM PERC H330 | NO HDD
$169.34
Dell Poweredge R630 1U | 1x Intel Xeon E5-2640 v3 32GB RAM PERC H330 | NO HDD pictureDell PowerEdge EMC R440 4LFF 1X GOLD 6140 18C 2.3GHZ 384GB Memory 2x 4TB SAS
$5440.0
Dell PowerEdge EMC R440 4LFF 1X GOLD 6140 18C 2.3GHZ 384GB Memory 2x 4TB SAS pictureDell PowerEdge R730XD Server / 2x E5-2620 v3 =12 Cores / 32GB RAM / 2x 250GB SSD
$1064.0
Dell PowerEdge R730XD Server / 2x E5-2620 v3 =12 Cores / 32GB RAM / 2x 250GB SSD picture


Discussions

No Discussions have been posted on this vulnerability.