How to Buy
This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated krb5 packages which fix two buffer overflow vulnerabilities in
the included Kerberos-aware telnet client are now available.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
Kerberos is a networked authentication system which uses a trusted
third party (a KDC) to authenticate clients and servers to each other.
The krb5-workstation package includes a Kerberos-aware telnet client.
Two buffer overflow flaws were discovered in the way the telnet client
handles messages from a server. An attacker may be able to execute
arbitrary code on a victim's machine if the victim can be tricked into
connecting to a malicious telnet server. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the names
CVE-2005-0468 and CVE-2005-0469 to these issues.
Users of krb5 should update to these erratum packages which contain a
backported patch to correct this issue.
Red Hat would like to thank iDEFENSE for their responsible disclosure
of this issue.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 17659 ()
CVE ID: CVE-2005-0468CVE-2005-0469
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.