Описание
ELSA-2010-0926: krb5 security update (MODERATE)
[1.6.1-36.el5_5.6]
- incorporate candidate patch for checksum acceptance issues from MITKRB5-SA-2010-007 (CVE-2010-1323, #652307)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
krb5-devel
1.6.1-36.el5_5.6
krb5-libs
1.6.1-36.el5_5.6
krb5-server
1.6.1-36.el5_5.6
krb5-workstation
1.6.1-36.el5_5.6
Oracle Linux x86_64
krb5-devel
1.6.1-36.el5_5.6
krb5-libs
1.6.1-36.el5_5.6
krb5-server
1.6.1-36.el5_5.6
krb5-workstation
1.6.1-36.el5_5.6
Oracle Linux i386
krb5-devel
1.6.1-36.el5_5.6
krb5-libs
1.6.1-36.el5_5.6
krb5-server
1.6.1-36.el5_5.6
krb5-workstation
1.6.1-36.el5_5.6
Связанные CVE
Связанные уязвимости
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x ...
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.