Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA703] DSA-703-1 krb5 Vulnerability Scan


Vulnerability Scan Summary
DSA-703-1 krb5

Detailed Explanation for this Vulnerability Test

Several problems have been discovered in telnet clients that could be
exploited by malicious daemons the client connects to. The Common
Vulnerabilities and Exposures project identifies the following
problems:
Gaël Delalleau discovered a buffer overflow in the env_opt_add()
function that allow a remote attacker to execute arbitrary code.
Gaël Delalleau discovered a buffer overflow in the handling of the
LINEMODE suboptions in telnet clients. This can lead to the
execution of arbitrary code when connected to a malicious server.
For the stable distribution (woody) these problems have been fixed in
version 1.2.4-5woody8.
For the unstable distribution (sid) these problems have been fixed in
version 1.3.6-1.
We recommend that you upgrade your krb5 package.


Solution : http://www.debian.org/security/2005/dsa-703
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.