Family: Debian Local Security Checks --> Category: infos
[DSA183] DSA-183-1 krb5 Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Tom Yu and Sam Hartman of MIT discovered another stack buffer overflow
in the kadm_ser_wrap_in function in the Kerberos v4 administration
server. This kadmind bug has a working exploit code circulating,
hence it is considered serious. The MIT krb5 implementation
includes support for version 4, including a complete v4 library,
server side support for krb4, and limited client support for v4.
This problem has been fixed in version 1.2.4-5woody3 for the current
stable distribution (woody) and in version 1.2.6-2 for the unstable
distribution (sid). The old stable distribution (potato) is not
affected since no krb5 packages are included.
We recommend that you upgrade your krb5 packages immediately.
Solution : http://www.debian.org/security/2002/dsa-183
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.