|
Family: Fedora Local Security Checks --> Category: infos
Fedora Core 3 2004-564: krb5 Vulnerability Scan
Vulnerability Scan Summary Check for the version of the krb5 package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory FEDORA-2004-564 (krb5).
Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of cleartext passwords.
A heap based buffer overflow bug was found in the administration
library of Kerberos 1.3.5 and earlier. This overflow in the password
history handling code could allow an authenticated remote attacker to
execute commands on a realm's master Kerberos KDC. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-1189 to this issue.
Additionally a temporary file bug was found in the Kerberos
krb5-send-pr command. It is possible that a possible hacker could create a
specially crafted temporary file that could allow an arbitrary file
to be overwritten which the victim has write access to. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-0971 to this issue.
Solution : http://www.fedoranews.org/blog/index.php?p=219
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|