![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.51051 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2004:350 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory RHSA-2004:350. Kerberos is a networked authentication system that uses a trusted third party (a KDC) to authenticate clients and servers to each other. Several double-free bugs were found in the Kerberos 5 KDC and libraries. A remote attacker could potentially exploit these flaws to execuate arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2004-0642 and CVE-2004-0643 to these issues. A double-free bug was also found in the krb524 server (CVE-2004-0772), however this issue does not affect Red Hat Enterprise Linux 3 Kerberos packages. An infinite loop bug was found in the Kerberos 5 ASN.1 decoder library. A remote attacker may be able to trigger this flaw and cause a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0644 to this issue. When attempting to contact a KDC, the Kerberos libraries will iterate through the list of configured servers, attempting to contact each in turn. If one of the servers becomes unresponsive, the client will time out and contact the next configured server. When the library attempts to contact the next KDC, the entire process is repeated. For applications which must contact a KDC several times, the accumulated time spent waiting can become significant. This update modifies the libraries, notes which server for a given realm last responded to a request, and attempts to contact that server first before contacting any of the other configured servers. All users of krb5 should upgrade to these updated packages, which contain backported security patches to resolve these issues. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2004-350.html http://web.mit.edu/kerberos/advisories/ Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-0642 BugTraq ID: 11078 http://www.securityfocus.com/bid/11078 Bugtraq: 20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos) (Google Search) http://marc.info/?l=bugtraq&m=109508872524753&w=2 Cert/CC Advisory: TA04-247A http://www.us-cert.gov/cas/techalerts/TA04-247A.html CERT/CC vulnerability note: VU#795632 http://www.kb.cert.org/vuls/id/795632 Conectiva Linux advisory: CLA-2004:860 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 Debian Security Information: DSA-543 (Google Search) http://www.debian.org/security/2004/dsa-543 http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10709 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4936 RedHat Security Advisories: RHSA-2004:350 http://rhn.redhat.com/errata/RHSA-2004-350.html http://www.trustix.net/errata/2004/0045/ XForce ISS Database: kerberos-kdc-double-free(17157) https://exchange.xforce.ibmcloud.com/vulnerabilities/17157 Common Vulnerability Exposure (CVE) ID: CVE-2004-0643 CERT/CC vulnerability note: VU#866472 http://www.kb.cert.org/vuls/id/866472 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10267 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3322 XForce ISS Database: kerberos-krb5rdcred-double-free(17159) https://exchange.xforce.ibmcloud.com/vulnerabilities/17159 Common Vulnerability Exposure (CVE) ID: CVE-2004-0644 BugTraq ID: 11079 http://www.securityfocus.com/bid/11079 CERT/CC vulnerability note: VU#550464 http://www.kb.cert.org/vuls/id/550464 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10014 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2139 XForce ISS Database: kerberos-asn1-library-dos(17160) https://exchange.xforce.ibmcloud.com/vulnerabilities/17160 Common Vulnerability Exposure (CVE) ID: CVE-2004-0772 CERT/CC vulnerability note: VU#350792 http://www.kb.cert.org/vuls/id/350792 http://www.mandriva.com/security/advisories?name=MDKSA-2004:088 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4661 XForce ISS Database: kerberos-krb524d-double-free(17158) https://exchange.xforce.ibmcloud.com/vulnerabilities/17158 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |