Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871680
Categoría:Red Hat Local Security Checks
Título:RedHat Update for krb5 RHSA-2016:2591-02
Resumen:The remote host is missing an update for the 'krb5'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'krb5'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Kerberos is a network authentication system,
which can improve the security of your network by eliminating the insecure practice
of sending passwords over the network in unencrypted form. It allows clients and
servers to authenticate to each other with the help of a trusted third party, the
Kerberos key distribution center (KDC).

The following packages have been upgraded to a newer upstream version: krb5
(1.14.1). (BZ#1292153)

Security Fix(es):

* A NULL pointer dereference flaw was found in MIT Kerberos kadmind
service. An authenticated attacker with permission to modify a principal
entry could use this flaw to cause kadmind to dereference a null pointer
and crash by supplying an empty DB argument to the modify_principal
command, if kadmind was configured to use the LDAP KDB module.
(CVE-2016-3119)

* A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc
service. An authenticated attacker could use this flaw to cause krb5kdc to
dereference a null pointer and crash by making an S4U2Self request, if the
restrict_anonymous_to_tgt option was set to true. (CVE-2016-3120)

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

Affected Software/OS:
krb5 on
Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-3119
BugTraq ID: 85392
http://www.securityfocus.com/bid/85392
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
RedHat Security Advisories: RHSA-2016:2591
http://rhn.redhat.com/errata/RHSA-2016-2591.html
http://www.securitytracker.com/id/1035399
SuSE Security Announcement: openSUSE-SU-2016:0947 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
SuSE Security Announcement: openSUSE-SU-2016:1072 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-3120
BugTraq ID: 92132
http://www.securityfocus.com/bid/92132
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
http://www.securitytracker.com/id/1036442
SuSE Security Announcement: openSUSE-SU-2016:2268 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
CopyrightCopyright (C) 2016 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.