Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Fedora Local Security Checks --> Category: infos

Fedora Core 3 2004-564: krb5 Vulnerability Scan


Vulnerability Scan Summary
Check for the version of the krb5 package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory FEDORA-2004-564 (krb5).

Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of cleartext passwords.

A heap based buffer overflow bug was found in the administration
library of Kerberos 1.3.5 and earlier. This overflow in the password
history handling code could allow an authenticated remote attacker to
execute commands on a realm's master Kerberos KDC. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-1189 to this issue.

Additionally a temporary file bug was found in the Kerberos
krb5-send-pr command. It is possible that a possible hacker could create a
specially crafted temporary file that could allow an arbitrary file
to be overwritten which the victim has write access to. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-0971 to this issue.



Solution : http://www.fedoranews.org/blog/index.php?p=219
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.