Scientific Linux Security Update : krb5 on SL6.x i386/x86_64

Medium Nessus Plugin ID 90145


The remote Scientific Linux host is missing one or more security updates.


A memory leak flaw was found in the krb5_unparse_name() function of the MIT Kerberos kadmind service. An authenticated attacker could repeatedly send specially crafted requests to the server, which could cause the server to consume large amounts of memory resources, ultimately leading to a denial of service due to memory exhaustion.

An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure. (CVE-2015-8629)

After installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 90145

File Name: sl_20160323_krb5_on_SL6_x.nasl

Version: $Revision: 2.2 $

Type: local

Agent: unix

Published: 2016/03/24

Modified: 2016/10/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C


Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2016/03/23

Reference Information

CVE: CVE-2015-8629, CVE-2015-8631