Amazon Linux AMI : krb5 Multiple Vulnerabilities (ALAS-2012-114)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

An uninitialized pointer use flaw was found in the way the MIT
Kerberos KDC handled initial authentication requests (AS-REQ). A
remote, unauthenticated attacker could use this flaw to crash the KDC
via a specially crafted AS-REQ request. (CVE-2012-1015)

A NULL pointer dereference flaw was found in the MIT Kerberos
administration daemon, kadmind. A Kerberos administrator who has the
'create' privilege could use this flaw to crash kadmind.
(CVE-2012-1013)

See also :

http://www.nessus.org/u?cbc2e3c5

Solution :

Run 'yum update krb5' to update your system.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69604 ()

Bugtraq ID:

CVE ID: CVE-2012-1013
CVE-2012-1015