GLSA-201201-14 : MIT Kerberos 5 Applications: Multiple vulnerabilities

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201201-14
(MIT Kerberos 5 Applications: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in MIT Kerberos 5
Applications:
An error in the FTP daemon prevents it from dropping its initial
effective group identifier (CVE-2011-1526).
A boundary error in the telnet daemon and client could cause a buffer
overflow (CVE-2011-4862).

Impact :

An unauthenticated remote attacker may be able to execute arbitrary code
with the privileges of the user running the telnet daemon or client.
Furthermore, an authenticated remote attacker may be able to read or
write files owned by the same group as the effective group of the FTP
daemon.

Workaround :

There is no known workaround at this time.

See also :

http://www.gentoo.org/security/en/glsa/glsa-201201-14.xml

Solution :

All MIT Kerberos 5 Applications users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose
'>=app-crypt/mit-krb5-appl-1.0.2-r1'

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 57656 ()

Bugtraq ID: 48571
51182

CVE ID: CVE-2011-1526
CVE-2011-4862