RHEL 2.1 / 3 / 4 : krb5 (RHSA-2005:330)

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated krb5 packages which fix two buffer overflow vulnerabilities in
the included Kerberos-aware telnet client are now available.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

Kerberos is a networked authentication system which uses a trusted
third party (a KDC) to authenticate clients and servers to each other.

The krb5-workstation package includes a Kerberos-aware telnet client.
Two buffer overflow flaws were discovered in the way the telnet client
handles messages from a server. An attacker may be able to execute
arbitrary code on a victim's machine if the victim can be tricked into
connecting to a malicious telnet server. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the names
CVE-2005-0468 and CVE-2005-0469 to these issues.

Users of krb5 should update to these erratum packages which contain a
backported patch to correct this issue.

Red Hat would like to thank iDEFENSE for their responsible disclosure
of this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2005-0468.html
https://www.redhat.com/security/data/cve/CVE-2005-0469.html
http://www.nessus.org/u?69f65c02
http://www.nessus.org/u?0f2f4fd7
http://rhn.redhat.com/errata/RHSA-2005-330.html

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 17659 ()

Bugtraq ID:

CVE ID: CVE-2005-0468
CVE-2005-0469