Amazon Linux AMI : krb5 (ALAS-2012-114)

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.

Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

An uninitialized pointer use flaw was found in the way the MIT
Kerberos KDC handled initial authentication requests (AS-REQ). A
remote, unauthenticated attacker could use this flaw to crash the KDC
via a specially crafted AS-REQ request. (CVE-2012-1015)

A NULL pointer dereference flaw was found in the MIT Kerberos
administration daemon, kadmind. A Kerberos administrator who has the
'create' privilege could use this flaw to crash kadmind.

See also :

Solution :

Run 'yum update krb5' to update your system.

Risk factor :

High / CVSS Base Score : 9.3

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69604 ()

Bugtraq ID:

CVE ID: CVE-2012-1013