|
Family: Debian Local Security Checks --> Category: infos
[DSA731] DSA-731-1 krb4 Vulnerability Scan
Vulnerability Scan Summary DSA-731-1 krb4
Detailed Explanation for this Vulnerability Test
Several problems have been discovered in telnet clients that could be
exploited by malicious daemons the client connects to. The Common
Vulnerabilities and Exposures project identifies the following
problems:
Gaël Delalleau discovered a buffer overflow in the env_opt_add()
function that allow a remote attacker to execute arbitrary code.
Gaël Delalleau discovered a buffer overflow in the handling of the
LINEMODE suboptions in telnet clients. This can lead to the
execution of arbitrary code when connected to a malicious server.
For the stable distribution (woody) these problems have been fixed in
version 1.1-8-2.4.
For the testing distribution (sarge) these problems have been fixed in
version 1.2.2-11.2.
For the unstable distribution (sid) these problems have been fixed in
version 1.2.2-11.2.
We recommend that you upgrade your krb4 packages.
Solution : http://www.debian.org/security/2005/dsa-731
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|