Nessus Plugin #17674
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[DSA703] DSA-703-1 krb5
- Family:
- Debian Local Security Checks
- Category:
- infos
- Copyright:
- This script is (C) 2005 Michel Arboi
- Summary:
- DSA-703-1 krb5
- Version:
- $Revision: 1.1 $
- Cve_id:
- CAN-2005-0468, CAN-2005-0469
- Bugtraq_id:
- -
- Xrefs:
- DSA:703, CERT:291924, CERT:341908
- Description:
Several problems have been discovered in telnet clients that could be
exploited by malicious daemons the client connects to. The Common
Vulnerabilities and Exposures project identifies the following
problems:
Gaδl Delalleau discovered a buffer overflow in the env_opt_add()
function that allow a remote attacker to execute arbitrary code.
Gaδl Delalleau discovered a buffer overflow in the handling of the
LINEMODE suboptions in telnet clients. This can lead to the
execution of arbitrary code when connected to a malicious server.
For the stable distribution (woody) these problems have been fixed in
version 1.2.4-5woody8.
For the unstable distribution (sid) these problems have been fixed in
version 1.3.6-1.
We recommend that you upgrade your krb5 package.
Solution : http://www.debian.org/security/2005/dsa-703
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.