|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2005:012|
|Summary:||Redhat Security Advisory RHSA-2005:012|
The remote host is missing updates announced in
Kerberos is a networked authentication system that uses a trusted third
party (a KDC) to authenticate clients and servers to each other.
A heap based buffer overflow bug was found in the administration library of
Kerberos 1.3.5 and earlier. This bug could allow an authenticated remote
attacker to execute arbitrary commands on a realm's master Kerberos KDC.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-1189 to this issue.
Additionally a temporary file bug was found in the Kerberos krb5-send-pr
program. It is possible that an attacker could create a temporary file
that would allow an arbitrary file to be overwritten which the victim has
write access to. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0971 to this issue.
All users of krb5 should upgrade to these updated packages, which contain
backported security patches to resolve these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2004-0971|
BugTraq ID: 11289
XForce ISS Database: script-temporary-file-overwrite(17583)
Common Vulnerability Exposure (CVE) ID: CVE-2004-1189
Bugtraq: 20041220 MITKRB5-SA-2004-004: heap overflow in libkadm5srv (Google Search)
Conectiva Linux advisory: CLA-2005:917
Bugtraq: 20050110 [USN-58-1] MIT Kerberos server vulnerability (Google Search)
XForce ISS Database: kerberos-libkadm5srv-bo(18621)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58880 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.