Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58328
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1276-1)
Summary:The remote host is missing an update for the Debian 'krb5' package(s) announced via the DSA-1276-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'krb5' package(s) announced via the DSA-1276-1 advisory.

Vulnerability Insight:
Several remote vulnerabilities have been discovered in the MIT reference implementation of the Kerberos network authentication protocol suite, which may lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-0956

It was discovered that the krb5 telnet daemon performs insufficient validation of usernames, which might allow unauthorized logins or privilege escalation.

CVE-2007-0957

iDefense discovered that a buffer overflow in the logging code of the KDC and the administration daemon might lead to arbitrary code execution.

CVE-2007-1216

It was discovered that a double free in the RPCSEC_GSS part of the GSS library code might lead to arbitrary code execution.

For the stable distribution (sarge) these problems have been fixed in version 1.3.6-2sarge4.

For the upcoming stable distribution (etch) these problems have been fixed in version 1.4.4-7etch1.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your Kerberos packages.

Affected Software/OS:
'krb5' package(s) on Debian 3.1, Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0956
BugTraq ID: 23281
http://www.securityfocus.com/bid/23281
Bugtraq: 20070403 MITKRB5-SA-2007-001: telnetd allows login as arbitrary user [CVE-2007-0956] (Google Search)
http://www.securityfocus.com/archive/1/464590/100/0/threaded
Bugtraq: 20070404 rPSA-2007-0063-1 krb5 krb5-server krb5-services krb5-test krb5-workstation (Google Search)
http://www.securityfocus.com/archive/1/464666/100/0/threaded
Bugtraq: 20070405 FLEA-2007-0008-1: krb5 (Google Search)
http://www.securityfocus.com/archive/1/464814/30/7170/threaded
Cert/CC Advisory: TA07-093B
http://www.us-cert.gov/cas/techalerts/TA07-093B.html
CERT/CC vulnerability note: VU#220816
http://www.kb.cert.org/vuls/id/220816
Debian Security Information: DSA-1276 (Google Search)
http://www.debian.org/security/2007/dsa-1276
http://security.gentoo.org/glsa/glsa-200704-02.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10046
http://www.redhat.com/support/errata/RHSA-2007-0095.html
http://www.securitytracker.com/id?1017848
http://secunia.com/advisories/24706
http://secunia.com/advisories/24735
http://secunia.com/advisories/24736
http://secunia.com/advisories/24740
http://secunia.com/advisories/24750
http://secunia.com/advisories/24755
http://secunia.com/advisories/24757
http://secunia.com/advisories/24785
http://secunia.com/advisories/24786
http://secunia.com/advisories/24817
SGI Security Advisory: 20070401-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102867-1
SuSE Security Announcement: SUSE-SA:2007:025 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
http://www.ubuntu.com/usn/usn-449-1
http://www.vupen.com/english/advisories/2007/1218
http://www.vupen.com/english/advisories/2007/1249
XForce ISS Database: kerberos-telnet-security-bypass(33414)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33414
Common Vulnerability Exposure (CVE) ID: CVE-2007-0957
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
BugTraq ID: 23285
http://www.securityfocus.com/bid/23285
Bugtraq: 20070403 MITKRB5-SA-2007-002: KDC, kadmind stack overflow in krb5_klog_syslog [CVE-2007-0957] (Google Search)
http://www.securityfocus.com/archive/1/464592/100/0/threaded
Cert/CC Advisory: TA07-109A
http://www.us-cert.gov/cas/techalerts/TA07-109A.html
CERT/CC vulnerability note: VU#704024
http://www.kb.cert.org/vuls/id/704024
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757
http://www.securitytracker.com/id?1017849
http://secunia.com/advisories/24798
http://secunia.com/advisories/24966
http://secunia.com/advisories/25464
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1
http://www.vupen.com/english/advisories/2007/1250
http://www.vupen.com/english/advisories/2007/1470
http://www.vupen.com/english/advisories/2007/1983
XForce ISS Database: kerberos-krb5klogsyslog-bo(33411)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33411
Common Vulnerability Exposure (CVE) ID: CVE-2007-1216
BugTraq ID: 23282
http://www.securityfocus.com/bid/23282
Bugtraq: 20070403 MITKRB5-SA-2007-003: double-free vulnerability in kadmind (via GSS-API library) [CVE-2007-1216] (Google Search)
http://www.securityfocus.com/archive/1/464591/100/0/threaded
CERT/CC vulnerability note: VU#419344
http://www.kb.cert.org/vuls/id/419344
HPdes Security Advisory: HPSBUX02217
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056923
HPdes Security Advisory: SSRT071337
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11135
http://www.securitytracker.com/id?1017852
http://secunia.com/advisories/25388
http://www.vupen.com/english/advisories/2007/1916
XForce ISS Database: kerberos-kadmind-code-execution(33413)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33413
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.