Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58885
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2007:0095
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2007:0095.

Kerberos is a network authentication system which allows clients and
servers to authenticate to each other through use of symmetric encryption
and a trusted third party, the KDC.

A flaw was found in the username handling of the MIT krb5 telnet daemon
(telnetd). A remote attacker who can access the telnet port of a target
machine could log in as root without requiring a password. (CVE-2007-0956)

Note that the krb5 telnet daemon is not enabled by default in any version
of Red Hat Enterprise Linux. In addition, the default firewall rules block
remote access to the telnet port. This flaw does not affect the telnet
daemon distributed in the telnet-server package.

For users who have enabled the krb5 telnet daemon and have it accessible
remotely, this update should be applied immediately.

Whilst we are not aware at this time that the flaw is being actively
exploited, we have confirmed that the flaw is very easily exploitable.

This update also fixes two additional security issues:

Buffer overflows were found which affect the Kerberos KDC and the kadmin
server daemon. A remote attacker who can access the KDC could exploit this
bug to run arbitrary code with the privileges of the KDC or kadmin server
processes. (CVE-2007-0957)

A double-free flaw was found in the GSSAPI library used by the kadmin
server daemon. Red Hat Enterprise Linux 4 and 5 contain checks within
glibc that detect double-free flaws. Therefore, on Red Hat Enterprise Linux
4 and 5 successful exploitation of this issue can only lead to a denial of
service. Applications which use this library in earlier releases of Red
Hat Enterprise Linux may also be affected. (CVE-2007-1216)

All users are advised to update to these erratum packages which contain a
backported fix to correct these issues.

Red Hat would like to thank MIT and iDefense for reporting these
vulnerabilities.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-0095.html
http://www.redhat.com/security/updates/classification/#critical

Risk factor : Critical

CVSS Score:
9.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-0956
BugTraq ID: 23281
http://www.securityfocus.com/bid/23281
Bugtraq: 20070403 MITKRB5-SA-2007-001: telnetd allows login as arbitrary user [CVE-2007-0956] (Google Search)
http://www.securityfocus.com/archive/1/464590/100/0/threaded
Bugtraq: 20070404 rPSA-2007-0063-1 krb5 krb5-server krb5-services krb5-test krb5-workstation (Google Search)
http://www.securityfocus.com/archive/1/464666/100/0/threaded
Bugtraq: 20070405 FLEA-2007-0008-1: krb5 (Google Search)
http://www.securityfocus.com/archive/1/464814/30/7170/threaded
Cert/CC Advisory: TA07-093B
http://www.us-cert.gov/cas/techalerts/TA07-093B.html
CERT/CC vulnerability note: VU#220816
http://www.kb.cert.org/vuls/id/220816
Debian Security Information: DSA-1276 (Google Search)
http://www.debian.org/security/2007/dsa-1276
http://security.gentoo.org/glsa/glsa-200704-02.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10046
http://www.redhat.com/support/errata/RHSA-2007-0095.html
http://www.securitytracker.com/id?1017848
http://secunia.com/advisories/24706
http://secunia.com/advisories/24735
http://secunia.com/advisories/24736
http://secunia.com/advisories/24740
http://secunia.com/advisories/24750
http://secunia.com/advisories/24755
http://secunia.com/advisories/24757
http://secunia.com/advisories/24785
http://secunia.com/advisories/24786
http://secunia.com/advisories/24817
SGI Security Advisory: 20070401-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102867-1
SuSE Security Announcement: SUSE-SA:2007:025 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
http://www.ubuntu.com/usn/usn-449-1
http://www.vupen.com/english/advisories/2007/1218
http://www.vupen.com/english/advisories/2007/1249
XForce ISS Database: kerberos-telnet-security-bypass(33414)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33414
Common Vulnerability Exposure (CVE) ID: CVE-2007-0957
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
BugTraq ID: 23285
http://www.securityfocus.com/bid/23285
Bugtraq: 20070403 MITKRB5-SA-2007-002: KDC, kadmind stack overflow in krb5_klog_syslog [CVE-2007-0957] (Google Search)
http://www.securityfocus.com/archive/1/464592/100/0/threaded
Cert/CC Advisory: TA07-109A
http://www.us-cert.gov/cas/techalerts/TA07-109A.html
CERT/CC vulnerability note: VU#704024
http://www.kb.cert.org/vuls/id/704024
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757
http://www.securitytracker.com/id?1017849
http://secunia.com/advisories/24798
http://secunia.com/advisories/24966
http://secunia.com/advisories/25464
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1
http://www.vupen.com/english/advisories/2007/1250
http://www.vupen.com/english/advisories/2007/1470
http://www.vupen.com/english/advisories/2007/1983
XForce ISS Database: kerberos-krb5klogsyslog-bo(33411)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33411
Common Vulnerability Exposure (CVE) ID: CVE-2007-1216
BugTraq ID: 23282
http://www.securityfocus.com/bid/23282
Bugtraq: 20070403 MITKRB5-SA-2007-003: double-free vulnerability in kadmind (via GSS-API library) [CVE-2007-1216] (Google Search)
http://www.securityfocus.com/archive/1/464591/100/0/threaded
CERT/CC vulnerability note: VU#419344
http://www.kb.cert.org/vuls/id/419344
HPdes Security Advisory: HPSBUX02217
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923
HPdes Security Advisory: SSRT071337
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135
http://www.securitytracker.com/id?1017852
http://secunia.com/advisories/25388
http://www.vupen.com/english/advisories/2007/1916
XForce ISS Database: kerberos-kadmind-code-execution(33413)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33413
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.