Nessus Plugin #17674

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[DSA703] DSA-703-1 krb5

Family:
Debian Local Security Checks
Category:
infos
Copyright:
This script is (C) 2005 Michel Arboi
Summary:
DSA-703-1 krb5
Version:
$Revision: 1.1 $
Cve_id:
CAN-2005-0468, CAN-2005-0469
Bugtraq_id:
-
Xrefs:
DSA:703, CERT:291924, CERT:341908
Description:

Several problems have been discovered in telnet clients that could be
exploited by malicious daemons the client connects to. The Common
Vulnerabilities and Exposures project identifies the following
problems:
Gaδl Delalleau discovered a buffer overflow in the env_opt_add()
function that allow a remote attacker to execute arbitrary code.
Gaδl Delalleau discovered a buffer overflow in the handling of the
LINEMODE suboptions in telnet clients. This can lead to the
execution of arbitrary code when connected to a malicious server.
For the stable distribution (woody) these problems have been fixed in
version 1.2.4-5woody8.
For the unstable distribution (sid) these problems have been fixed in
version 1.3.6-1.
We recommend that you upgrade your krb5 package.


Solution : http://www.debian.org/security/2005/dsa-703
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.