![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.63394 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-1722-1) |
Summary: | The remote host is missing an update for the Debian 'libpam-heimdal' package(s) announced via the DSA-1722-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'libpam-heimdal' package(s) announced via the DSA-1722-1 advisory. Vulnerability Insight: Derek Chan discovered that the PAM module for the Heimdal Kerberos implementation allows reinitialisation of user credentials when run from a setuid context, resulting in potential local denial of service by overwriting the credential cache file or to local privilege escalation. For the stable distribution (etch), this problem has been fixed in version 2.5-1etch1. For the upcoming stable distribution (lenny), this problem has been fixed in version 3.10-2.1. For the unstable distribution (sid), this problem will be fixed soon. We recommend that you upgrade your libpam-heimdal package. Affected Software/OS: 'libpam-heimdal' package(s) on Debian 4. Solution: Please install the updated package(s). CVSS Score: 4.6 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0361 BugTraq ID: 33741 http://www.securityfocus.com/bid/33741 Bugtraq: 20090211 pam-krb5 security advisory (3.12 and earlier) (Google Search) http://www.securityfocus.com/archive/1/500892/100/0/threaded Debian Security Information: DSA-1721 (Google Search) http://www.debian.org/security/2009/dsa-1721 Debian Security Information: DSA-1722 (Google Search) http://www.debian.org/security/2009/dsa-1722 http://security.gentoo.org/glsa/glsa-200903-39.xml http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5403 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5521 http://securitytracker.com/id?1021711 http://secunia.com/advisories/33914 http://secunia.com/advisories/33917 http://secunia.com/advisories/33918 http://secunia.com/advisories/34260 http://secunia.com/advisories/34449 http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1 http://www.ubuntu.com/usn/USN-719-1 http://www.vupen.com/english/advisories/2009/0410 http://www.vupen.com/english/advisories/2009/0426 http://www.vupen.com/english/advisories/2009/0979 |
Copyright | Copyright (C) 2009 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |