Description: | Description:
The remote host is missing an update to krb5 announced via advisory MDKSA-2004:088.
A double-free vulnerability exists in the MIT Kerberos 5's KDC program that could potentially allow a remote attacker to execute arbitrary code on the KDC host. As well, multiple double-free vulnerabilities exist in the krb5 library code, which makes client programs and application servers vulnerable. The MIT Kerberos 5 development team believes that exploitation of these bugs would be difficult and no known vulnerabilities are believed to exist. The vulnerability in krb524d was discovered by Marc Horowitz the other double-free vulnerabilities were discovered by Will Fiveash and Nico Williams at Sun.
Will Fiveash and Nico Williams also found another vulnerability in the ASN.1 decoder library. This makes krb5 vulnerable to a DoS (Denial of Service) attack causing an infinite loop in the decoder. The KDC is vulnerable to this attack.
The MIT Kerberos 5 team has provided patches which have been applied to the updated software to fix these issues. Mandrakesoft encourages all users to upgrade immediately.
Affected versions: 10.0, 9.1, 9.2, Corporate Server 2.1, Multi Network Firewall 8.2
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:088 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0642 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0643 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0644 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0772 http://www.kb.cert.org/vuls/id/550464 http://www.kb.cert.org/vuls/id/795632 http://www.kb.cert.org/vuls/id/866472 http://www.kb.cert.org/vuls/id/350792 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-003-asn1.txt
Risk factor : High
CVSS Score: 7.5
|