Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.51947
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2005:330
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory RHSA-2005:330.

Kerberos is a networked authentication system which uses a trusted third
party (a KDC) to authenticate clients and servers to each other.

The krb5-workstation package includes a Kerberos-aware telnet client.
Two buffer overflow flaws were discovered in the way the telnet client
handles messages from a server. An attacker may be able to execute
arbitrary code on a victim's machine if the victim can be tricked into
connecting to a malicious telnet server. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the names CVE-2005-0468 and
CVE-2005-0469 to these issues.

Users of krb5 should update to these erratum packages which contain a
backported patch to correct this issue.

Red Hat would like to thank iDEFENSE for their responsible disclosure of
this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-330.html
http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=221&type=vulnerabilities

Risk factor : High

CVSS Score:
7.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-0468
BugTraq ID: 12919
http://www.securityfocus.com/bid/12919
CERT/CC vulnerability note: VU#341908
http://www.kb.cert.org/vuls/id/341908
Conectiva Linux advisory: CLA-2005:962
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000962
Debian Security Information: DSA-703 (Google Search)
http://www.debian.org/security/2005/dsa-703
Debian Security Information: DSA-731 (Google Search)
http://www.debian.de/security/2005/dsa-731
FreeBSD Security Advisory: FreeBSD-SA-05:01.telnet
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc
http://www.idefense.com/application/poi/display?id=221&type=vulnerabilities
http://www.mandriva.com/security/advisories?name=MDKSA-2005:061
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9640
http://www.redhat.com/support/errata/RHSA-2005-327.html
http://www.redhat.com/support/errata/RHSA-2005-330.html
http://secunia.com/advisories/14745
http://secunia.com/advisories/17899
SGI Security Advisory: 20050405-01-P
ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1
http://www.ubuntulinux.org/usn/usn-224-1
Common Vulnerability Exposure (CVE) ID: CVE-2005-0469
BugTraq ID: 12918
http://www.securityfocus.com/bid/12918
CERT/CC vulnerability note: VU#291924
http://www.kb.cert.org/vuls/id/291924
Debian Security Information: DSA-697 (Google Search)
http://www.debian.org/security/2005/dsa-697
Debian Security Information: DSA-699 (Google Search)
http://www.debian.org/security/2005/dsa-699
http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml
http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.