[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3395-2 krb5 -- krb5

ID: oval:org.secpod.oval:def:602275Date: (C)2015-11-24   (M)2023-12-07
Class: PATCHFamily: unix




Marc Deslauriers reported that the update for krb5 issued as DSA-3395-1 did not contain the patch to address CVE-2015-2697 for the packages built for the oldstable distribution . Updated packages are now available to address this issue. For reference, the relevant part of the original advisory text follows. CVE-2015-2697 It was discovered that the build_principal_va function incorrectly handles input strings. An authenticated attacker can take advantage of this flaw to cause a KDC to crash using a TGS request with a large realm field beginning with a null byte.

Platform:
Debian 7.x
Product:
krb5-kdc
krb5-kdc-ldap
krb5-admin-server
Reference:
DSA-3395-2
CVE-2015-2697
CVE    1
CVE-2015-2697
CPE    4
cpe:/a:mit:krb5-admin-server
cpe:/o:debian:debian_linux:7.x
cpe:/a:mit:krb5-kdc-ldap
cpe:/a:mit:krb5-kdc
...

© SecPod Technologies