Description: | Description:
The remote host is missing updates announced in advisory TSLSA-2007-0021.
kerberos5 < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - SECURITY Fix: Some vulnerabilities have been reported in Kerberos, which can be exploited by malicious users to compromise a vulnerable system. - An error exists within the gssrpc__svcauth_gssapi function in the RPC library, which can cause kadmind and possibly other third-party products to free an uninitialised pointer when receiving an RPC credential with a length of zero. - A signedness error exists within the gssrpc__svcauth_unix() function in the RPC library, which is used by kadmind and possibly other third-party products. This can be exploited to cause a stack-based buffer overflow. - Fixes stack-based buffer overflow error in kadmind within the rename_principal_2_svc function which could allow remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-2442, CVE-2007-2443 and CVE-2007-2798 to these issues.
Solution: Update your system with the packages as indicated in the referenced security advisory.
http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2007-0021
Risk factor : Critical
CVSS Score: 9.3
|