Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2007-0858

Опубликовано: 04 сент. 2007
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2007-0858: Important: krb5 security update (IMPORTANT)

[1.5-28]

  • add preliminary patch to fix buffer overflow in rpcsec_gss implementation in libgssrpc (#250973, CVE-2007-3999) and write through uninitialized pointer in kadmind (#250976, CVE-2007-4000)

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

krb5-devel

1.5-28

krb5-libs

1.5-28

krb5-server

1.5-28

krb5-workstation

1.5-28

Oracle Linux i386

krb5-devel

1.5-28

krb5-libs

1.5-28

krb5-server

1.5-28

krb5-workstation

1.5-28

Связанные CVE

Связанные уязвимости

fstec
почти 18 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

ubuntu
почти 18 лет назад

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.

redhat
почти 18 лет назад

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.

nvd
почти 18 лет назад

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.

debian
почти 18 лет назад

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy. ...