Family: Debian Local Security Checks --> Category: infos
[DSA520] DSA-520-1 krb5 Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
In their advisory MITKRB5-SA-2004-001, the MIT Kerberos announced the
existence of buffer overflow vulnerabilities in the
krb5_aname_to_localname function. This function is only used if
aname_to_localname is enabled in the configuration (this is not
enabled by default).
For the current stable distribution (woody), this problem has been
fixed in version 1.2.4-5woody5.
For the unstable distribution (sid), this problem has been fixed in
We recommend that you update your krb5 package.
Solution : http://www.debian.org/security/2004/dsa-520
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.