Scientific Linux Security Update : openafs on SL5.x, SL6.x i386/x86_64

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

OpenAFS uses Kerberos tickets to secure network traffic. For
historical reasons, it has only supported the DES encryption algorithm
to encrypt these tickets. The weakness of DES's 56 bit key space has
long been known, however it has recently become possible to use that
weakness to cheaply (around $100) and rapidly (approximately 23 hours)
compromise a service's long term key. An attacker must first obtain a
ticket for the cell. They may then use a brute-force attack to
compromise the cell's private service key. Once an attacker has gained
access to the service key, they can use this to impersonate any user
within the cell, including the super user, giving them access to all
administrative capabilities as well as all user data. Recovering the
service key from a DES encrypted ticket is an issue for any Kerberos
service still using DES (and especially so for realms which still have
DES keys on their ticket granting ticket). (CVE-2013-4134)

The -encrypt option to the 'vos' volume management command should
cause it to encrypt all data between client and server. However, in
versions of OpenAFS later than 1.6.0, it has no effect, and data is
transmitted with integrity protection only. In all versions of
OpenAFS, vos -encrypt has no effect when combined with the -localauth
option. (CVE-2013-4135)

See also :

http://www.nessus.org/u?1779c80e

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 69068 ()

Bugtraq ID:

CVE ID: CVE-2013-4134
CVE-2013-4135