Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN224-1 : krb4, krb5 vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
krb4, krb5 vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

These remote packages are missing security patches :
- kerberos4kth-clients
- kerberos4kth-clients-x
- kerberos4kth-dev
- kerberos4kth-docs
- kerberos4kth-kdc
- kerberos4kth-kip
- kerberos4kth-servers
- kerberos4kth-servers-x
- kerberos4kth-services
- kerberos4kth-user
- kerberos4kth-x11
- kerberos4kth1
- krb5-admin-server
- krb5-clients
- krb5-doc
- krb5-ftpd
- krb5-kdc
- krb5-rsh-server
- krb5-telnetd
- krb5-user
- libkadm1-kerberos4kth
- libkadm55
- libkafs0-kerberos4kth
- libkdb-
[...]

Description :

Gaël Delalleau discovered a buffer overflow in the env_opt_add()
function of the Kerberos 4 and 5 telnet clients. By sending specially
crafted replies, a malicious telnet server could exploit this to
execute arbitrary code with the rights of the user running the
telnet client. (CVE-2005-0468)

Gaël Delalleau discovered a buffer overflow in the handling of the
LINEMODE suboptions in the telnet clients of Kerberos 4 and 5. By
sending a specially constructed reply containing a large number of SLC
(Set Local Character) commands, a remote attacker (i. e. a malicious
telnet server) could execute arbitrary commands with the rights of
the user running the telnet client. (CVE-2005-0469)

Daniel Wachdorf discovered two remote vulnerabilities in the Key
Distribution Center of Kerberos 5 (krb5-kdc). By sending certain TCP
connection requests, a remote attacker could trigger a double-freeing
of memory, which led to memory corruption and a crash of the KDC
server. (CVE-2005-1174). Under rare circumstances the sam
[...]

Solution :

Upgrade to :
- kerberos4kth-clients-1.2.2-11.1ubuntu2.1 (Ubuntu 5.04)
- kerberos4kth-clients-x-1.2.2-11.1ubuntu2.1 (Ubuntu 5.04)
- kerberos4kth-dev-1.2.2-11.1ubuntu2.1 (Ubuntu 5.04)
- kerberos4kth-docs-1.2.2-11.1ubuntu2.1 (Ubuntu 5.04)
- kerberos4kth-kdc-1.2.2-11.1ubuntu2.1 (Ubuntu 5.04)
- kerberos4kth-kip-1.2.2-11.1ubuntu2.1 (Ubuntu 5.04)
- kerberos4kth-servers-1.2.2-11.1ubuntu2.1 (Ubuntu 5.04)
- kerberos4kth-servers-x-1.2.2-11.1ubuntu2.1 (Ubuntu 5.04)
- kerberos4kth-services-1.2.2-11.1ubuntu2.1 (Ubuntu
[...]


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.