FreeBSD : krb5 -- heap buffer overflow vulnerability in libkadm5srv (0bb7677d-52f3-11d9-a9e7-0001020eed82)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A MIT krb5 Security Advisory reports :

The MIT Kerberos 5 administration library (libkadm5srv) contains a
heap buffer overflow in password history handling code which could be
exploited to execute arbitrary code on a Key Distribution Center (KDC)
host. The overflow occurs during a password change of a principal with
a certain password history state. An administrator must have performed
a certain password policy change in order to create the vulnerable
state.

An authenticated user, not necessarily one with administrative
privileges, could execute arbitrary code on the KDC host, compromising
an entire Kerberos realm.

See also :

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
http://www.nessus.org/u?124f5403

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 18834 (freebsd_pkg_0bb7677d52f311d9a9e70001020eed82.nasl)

Bugtraq ID:

CVE ID: CVE-2004-1189

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now