Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51222
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2002:250
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2002:250.

A remotely exploitable stack buffer overflow has been found in the Kerberos
v4 compatibility administration daemon distributed with the Red Hat Linux
krb5 packages.

[Updated 09 Jan 2003]
Added fixed packages for the Itanium (IA64) architecture.

Kerberos is a network authentication system.

A stack buffer overflow has been found in the implementation of the
Kerberos v4 compatibility administration daemon (kadmind4), which is part
of the MIT krb5 distribution. This vulnerability is present in version
1.2.6 and earlier of the MIT krb5 distribution and can be exploited to gain
unauthorized root access to a KDC host. The attacker does not need to
authenticate to the daemon to successfully perform this attack.

kadmind4 is included in the Kerberos packages in Red Hat Linux Advanced
Server but is not enabled or used by default.

All users of Kerberos are advised to upgrade to these errata packages which
contain a backported patch and are not vulnerable to this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2002-250.html
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: BugTraq ID: 6024
Common Vulnerability Exposure (CVE) ID: CVE-2002-1235
http://www.securityfocus.com/bid/6024
Bugtraq: 20021023 MITKRB5-SA-2002-002: Buffer overflow in kadmind4 (Google Search)
http://marc.info/?l=bugtraq&m=103539530729206&w=2
Bugtraq: 20021026 Updated: MITKRB5-SA-2002-002: Buffer overflow in kadmind4 (Google Search)
http://marc.info/?l=bugtraq&m=103564944215101&w=2
Bugtraq: 20021027 KRB5-SORCERER2002-10-27 Security Update (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2002-10/0399.html
Bugtraq: 20021027 Re: Buffer overflow in kadmind4 (Google Search)
http://marc.info/?l=bugtraq&m=103582805330339&w=2
Bugtraq: 20021028 GLSA: krb5 (Google Search)
http://marc.info/?l=bugtraq&m=103582517126392&w=2
http://www.cert.org/advisories/CA-2002-29.html
CERT/CC vulnerability note: VU#875073
http://www.kb.cert.org/vuls/id/875073
Conectiva Linux advisory: CLA-2002:534
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000534
Debian Security Information: DSA-183 (Google Search)
http://www.debian.org/security/2002/dsa-183
Debian Security Information: DSA-184 (Google Search)
http://www.debian.org/security/2002/dsa-184
Debian Security Information: DSA-185 (Google Search)
http://www.debian.org/security/2002/dsa-185
FreeBSD Security Advisory: FreeBSD-SA-02:40
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-073.php
NETBSD Security Advisory: NetBSD-SA2002-026
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-026.txt.asc
http://www.redhat.com/support/errata/RHSA-2002-242.html
http://www.iss.net/security_center/static/10430.php
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.