[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1524 krb5 -- several vulnerabilities

ID: oval:org.mitre.oval:def:8094Date: (C)2009-12-15   (M)2024-02-15
Class: PATCHFamily: unix




Several remote vulnerabilities have been discovered in the kdc component of the krb5, a system for authenticating users and services on a network. The Common Vulnerabilities and Exposures project identifies the following problems: An unauthenticated remote attacker may cause a krb4-enabled KDC to crash, expose information, or execute arbitrary code. Successful exploitation of this vulnerability could compromise the Kerberos key database and host security on the KDC host. An unauthenticated remote attacker may cause a krb4-enabled KDC to expose information. It is theoretically possible for the exposed information to include secret key data on some platforms. An unauthenticated remote attacker can cause memory corruption in the kadmind process, which is likely to cause kadmind to crash, resulting in a denial of service. It is at least theoretically possible for such corruption to result in database corruption or arbitrary code execution, though we have no such exploit and are not aware of any such exploits in use in the wild. In versions of MIT Kerberos shipped by Debian, this bug can only be triggered in configurations that allow large numbers of open file descriptors in a process.

Platform:
Debian 4.0
Debian 3.1
Product:
krb5
Reference:
DSA-1524
CVE-2008-0062
CVE-2008-0063
CVE-2008-0947
CVE    3
CVE-2008-0062
CVE-2008-0947
CVE-2008-0063
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:3.1

© SecPod Technologies