Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-03374

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 10
EPSS Средний

Описание

Множественные уязвимости пакета libkdb-1-kerberos4kth операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 3.0 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.0:
ppc:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
s390x:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
m68k:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
i686:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
hppa:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
sparc:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
alpha:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
ia64:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
mips:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
noarch:
kerberos4kth-docs - 1.1-8-2.2
kerberos4kth-services - 1.1-8-2.2
kerberos4kth-user - 1.1-8-2.2
kerberos4kth-x11 - 1.1-8-2.2
kerberos4kth1 - 1.1-8-2.2
mipsel:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
arm:
kerberos4kth-clients - 1.1-8-2.2
kerberos4kth-clients-x - 1.1-8-2.2
kerberos4kth-dev - 1.1-8-2.2
kerberos4kth-dev-common - 1.1-8-2.2
kerberos4kth-kdc - 1.1-8-2.2
kerberos4kth-kip - 1.1-8-2.2
kerberos4kth-servers - 1.1-8-2.2
kerberos4kth-servers-x - 1.1-8-2.2
libacl1-kerberos4kth - 1.1-8-2.2
libkadm1-kerberos4kth - 1.1-8-2.2
libkdb-1-kerberos4kth - 1.1-8-2.2
libkrb-1-kerberos4kth - 1.1-8-2.2
Debian GNU/Linux 2.2:
alpha:
kerberos4kth-clients - 1.0-2.2
kerberos4kth-dev - 1.0-2.2
kerberos4kth-kdc - 1.0-2.2
kerberos4kth-services - 1.0-2.2
kerberos4kth-user - 1.0-2.2
kerberos4kth-x11 - 1.0-2.2
kerberos4kth1 - 1.0-2.2
sparc:
kerberos4kth-clients - 1.0-2.2
kerberos4kth-dev - 1.0-2.2
kerberos4kth-kdc - 1.0-2.2
kerberos4kth-services - 1.0-2.2
kerberos4kth-user - 1.0-2.2
kerberos4kth-x11 - 1.0-2.2
kerberos4kth1 - 1.0-2.2
arm:
kerberos4kth-clients - 1.0-2.2
kerberos4kth-dev - 1.0-2.2
kerberos4kth-kdc - 1.0-2.2
kerberos4kth-services - 1.0-2.2
kerberos4kth-user - 1.0-2.2
kerberos4kth-x11 - 1.0-2.2
kerberos4kth1 - 1.0-2.2
m68k:
kerberos4kth-clients - 1.0-2.2
kerberos4kth-dev - 1.0-2.2
kerberos4kth-kdc - 1.0-2.2
kerberos4kth-services - 1.0-2.2
kerberos4kth-user - 1.0-2.2
kerberos4kth-x11 - 1.0-2.2
kerberos4kth1 - 1.0-2.2
i686:
kerberos4kth-clients - 1.0-2.2
kerberos4kth-dev - 1.0-2.2
kerberos4kth-kdc - 1.0-2.2
kerberos4kth-services - 1.0-2.2
kerberos4kth-user - 1.0-2.2
kerberos4kth-x11 - 1.0-2.2
kerberos4kth1 - 1.0-2

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 97%
0.32917
Средний

10 Critical

CVSS2

Связанные уязвимости

redhat
больше 22 лет назад

The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

nvd
больше 22 лет назад

The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

debian
больше 22 лет назад

The kadm_ser_in function in (1) the Kerberos v4compatibility administr ...

github
около 3 лет назад

The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 97%
0.32917
Средний

10 Critical

CVSS2