Family: Debian Local Security Checks --> Category: infos
[DSA703] DSA-703-1 krb5 Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Several problems have been discovered in telnet clients that could be
exploited by malicious daemons the client connects to. The Common
Vulnerabilities and Exposures project identifies the following
GaŽl Delalleau discovered a buffer overflow in the env_opt_add()
function that allow a remote attacker to execute arbitrary code.
GaŽl Delalleau discovered a buffer overflow in the handling of the
LINEMODE suboptions in telnet clients. This can lead to the
execution of arbitrary code when connected to a malicious server.
For the stable distribution (woody) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your krb5 package.
Solution : http://www.debian.org/security/2005/dsa-703
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.