Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0926

Опубликовано: 30 нояб. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0926: krb5 security update (MODERATE)

[1.6.1-36.el5_5.6]

  • incorporate candidate patch for checksum acceptance issues from MITKRB5-SA-2010-007 (CVE-2010-1323, #652307)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

krb5-devel

1.6.1-36.el5_5.6

krb5-libs

1.6.1-36.el5_5.6

krb5-server

1.6.1-36.el5_5.6

krb5-workstation

1.6.1-36.el5_5.6

Oracle Linux x86_64

krb5-devel

1.6.1-36.el5_5.6

krb5-libs

1.6.1-36.el5_5.6

krb5-server

1.6.1-36.el5_5.6

krb5-workstation

1.6.1-36.el5_5.6

Oracle Linux i386

krb5-devel

1.6.1-36.el5_5.6

krb5-libs

1.6.1-36.el5_5.6

krb5-server

1.6.1-36.el5_5.6

krb5-workstation

1.6.1-36.el5_5.6

Связанные CVE

Связанные уязвимости

CVSS3: 3.7
ubuntu
больше 14 лет назад

MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.

redhat
больше 14 лет назад

MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.

CVSS3: 3.7
nvd
больше 14 лет назад

MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.

CVSS3: 3.7
debian
больше 14 лет назад

MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x ...

CVSS3: 3.7
github
около 3 лет назад

MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.