Amazon Linux AMI : krb5 Remote Crash Vulnerability (ALAS-2013-182)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

A NULL pointer dereference flaw was found in the way the MIT Kerberos
KDC processed certain TGS (Ticket-granting Server) requests. A remote,
authenticated attacker could use this flaw to crash the KDC via a
specially crafted TGS request. (CVE-2013-1416)

See also :

http://www.nessus.org/u?288e5ab3

Solution :

Run 'yum update krb5' to update your system.

Risk factor :

Medium / CVSS Base Score : 4.0
(CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69741 ()

Bugtraq ID:

CVE ID: CVE-2013-1416