Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.72078
Kategorie:Mandrake Local Security Checks
Titel:Mandriva Security Advisory MDVSA-2011:184 (krb5)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to krb5
announced via advisory MDVSA-2011:184.

A vulnerability has been discovered and corrected in krb5:

The process_tgs_req function in do_tgs_req.c in the Key Distribution
Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows
remote authenticated users to cause a denial of service (NULL pointer
dereference and daemon crash) via a crafted TGS request that triggers
an error other than the KRB5_KDB_NOENTRY error (CVE-2011-1530).

The updated packages have been patched to correct this issue.

Affected: 2011.

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2011:184
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-007.txt

Risk factor : High

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-1530
BugTraq ID: 50929
http://www.securityfocus.com/bid/50929
Bugtraq: 20111206 MITKRB5-SA-2011-007 KDC null pointer dereference in TGS handling [CVE-2011-1530] (Google Search)
http://www.securityfocus.com/archive/1/520756/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDVSA-2011:184
http://www.redhat.com/support/errata/RHSA-2011-1790.html
http://securitytracker.com/id?1026374
http://secunia.com/advisories/47124
XForce ISS Database: kerberos-processtgsreq-dos(71655)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71655
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.