[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2016-0493 -- Oracle krb5

ID: oval:org.secpod.oval:def:1501410Date: (C)2016-03-31   (M)2023-09-11
Class: PATCHFamily: unix




Kerberos is a networked authentication system which allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos KDC. A memory leak flaw was found in the krb5_unparse_name function of the MIT Kerberos kadmind service. An authenticated attacker could repeatedly send specially crafted requests to the server, which could cause the server to consume large amounts of memory resources, ultimately leading to a denial of service due to memory exhaustion. An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure. The CVE-2015-8631 issue was discovered by Simo Sorce of Red Hat. All krb5 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, running Kerberos services will be restarted automatically.

Platform:
Oracle Linux 6
Product:
krb5
Reference:
ELSA-2016-0493
CVE-2015-8629
CVE-2015-8631
CVE    2
CVE-2015-8629
CVE-2015-8631
CPE    2
cpe:/o:oracle:linux:6
cpe:/a:mit:krb5

© SecPod Technologies