Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63761
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2009:0410
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2009:0410.

Kerberos is a network authentication system which allows clients and
servers to authenticate to each other using symmetric encryption and a
trusted third party, the Key Distribution Center (KDC).

An input validation flaw was found in the ASN.1 (Abstract Syntax Notation
One) decoder used by MIT Kerberos. A remote attacker could use this flaw to
crash a network service using the MIT Kerberos library, such as kadmind or
krb5kdc, by causing it to dereference or free an uninitialized pointer or,
possibly, execute arbitrary code with the privileges of the user running
the service. (CVE-2009-0846)

All krb5 users should upgrade to these updated packages, which contain a
backported patch to correct this issue. All running services using the MIT
Kerberos libraries must be restarted for the update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2009-0410.html
http://www.redhat.com/security/updates/classification/#critical
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-002.txt

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-0846
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
BugTraq ID: 34409
http://www.securityfocus.com/bid/34409
Bugtraq: 20090407 MITKRB5-SA-2009-002: ASN.1 decoder frees uninitialized pointer [CVE-2009-0846] (Google Search)
http://www.securityfocus.com/archive/1/502527/100/0/threaded
Bugtraq: 20090407 rPSA-2009-0058-1 krb5 krb5-server krb5-services krb5-test krb5-workstation (Google Search)
http://www.securityfocus.com/archive/1/502546/100/0/threaded
Bugtraq: 20090701 VMSA-2009-0008 ESX Service Console update for krb5 (Google Search)
http://www.securityfocus.com/archive/1/504683/100/0/threaded
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
CERT/CC vulnerability note: VU#662091
http://www.kb.cert.org/vuls/id/662091
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html
http://security.gentoo.org/glsa/glsa-200904-09.xml
HPdes Security Advisory: HPSBOV02682
http://marc.info/?l=bugtraq&m=130497213107107&w=2
HPdes Security Advisory: HPSBUX02421
http://marc.info/?l=bugtraq&m=124896429301168&w=2
HPdes Security Advisory: SSRT090047
HPdes Security Advisory: SSRT100495
http://www.mandriva.com/security/advisories?name=MDVSA-2009:098
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058
http://lists.vmware.com/pipermail/security-announce/2009/000059.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10694
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5483
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6301
http://www.redhat.com/support/errata/RHSA-2009-0408.html
RedHat Security Advisories: RHSA-2009:0409
http://rhn.redhat.com/errata/RHSA-2009-0409.html
RedHat Security Advisories: RHSA-2009:0410
http://rhn.redhat.com/errata/RHSA-2009-0410.html
http://www.securitytracker.com/id?1021994
http://secunia.com/advisories/34594
http://secunia.com/advisories/34598
http://secunia.com/advisories/34617
http://secunia.com/advisories/34622
http://secunia.com/advisories/34628
http://secunia.com/advisories/34630
http://secunia.com/advisories/34637
http://secunia.com/advisories/34640
http://secunia.com/advisories/34734
http://secunia.com/advisories/35074
http://secunia.com/advisories/35667
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1
http://www.ubuntu.com/usn/usn-755-1
http://www.vupen.com/english/advisories/2009/0960
http://www.vupen.com/english/advisories/2009/0976
http://www.vupen.com/english/advisories/2009/1057
http://www.vupen.com/english/advisories/2009/1106
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/2084
http://www.vupen.com/english/advisories/2009/2248
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.