|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for krb5 RHSA-2014:1255-01|
|Summary:||The remote host is missing an update for the 'krb5'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'krb5'
package(s) announced via the referenced advisory.
Kerberos is an authentication system which allows clients and services to
authenticate to each other with the help of a trusted third party, a
Kerberos Key Distribution Center (KDC).
A buffer overflow was found in the KADM5 administration server (kadmind)
when it was used with an LDAP back end for the KDC database. A remote,
authenticated attacker could potentially use this flaw to execute arbitrary
code on the system running kadmind. (CVE-2014-4345)
All krb5 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
updated packages, the krb5kdc and kadmind daemons will be restarted
krb5 on Red Hat Enterprise Linux (v. 5 server)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2014-4345|
BugTraq ID: 69168
Debian Security Information: DSA-3000 (Google Search)
RedHat Security Advisories: RHSA-2014:1255
RedHat Security Advisories: RHSA-2015:0439
SuSE Security Announcement: SUSE-SU-2014:1028 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:1043 (Google Search)
XForce ISS Database: kerberos-cve20144345-bo(95212)
|Copyright||Copyright (C) 2014 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.