openSUSE 10 Security Update : krb5 (krb5-3820)

High Nessus Plugin ID 27309


The remote openSUSE host is missing a security update.


This update fixes a stack-based buffer overflow in kadmind which can be exploited by authenticated remote users to gain root.
(CVE-2007-2798) Additionally two bugs in the RPC library of kadmind were fixed that can lead to remote system compromise. (CVE-2007-2442, CVE-2007-2443) Note that third-party applications using the RPC library are vulnerable, too.


Update the affected krb5 packages.

Plugin Details

Severity: High

ID: 27309

File Name: suse_krb5-3820.nasl

Version: $Revision: 1.12 $

Type: local

Agent: unix

Published: 2007/10/17

Modified: 2014/06/13

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:krb5, p-cpe:/a:novell:opensuse:krb5-32bit, p-cpe:/a:novell:opensuse:krb5-devel, p-cpe:/a:novell:opensuse:krb5-devel-32bit, p-cpe:/a:novell:opensuse:krb5-server, cpe:/o:novell:opensuse:10.1, cpe:/o:novell:opensuse:10.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2007/06/29

Reference Information

CVE: CVE-2007-2442, CVE-2007-2443, CVE-2007-2798

CWE: 119