Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
SuSE Update for krb5 SUSE-SA:2007:025
Information
Severity
Severity
Critical
Family
Family
SuSE Local Security Checks
CVSSv2 Base
CVSSv2 Base
9.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:S/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
15 years ago
Modified
Modified
6 years ago
Summary
Check for the Version of krb5
Insight
Insight
The krb5 telnet daemon allowed remote attackers to skip authentication and gain root access CVE-2007-0956 A bug in the function krb5_klog_syslog() leads to a buffer overflow which could be exploited to execute arbitrary code CVE-2007-0957. A double-free bug in the GSS-API library could crash kadmind. It's potentially also exploitable to execute arbitrary code CVE-2007-1216.
Affected Software
Affected Software
krb5 on SUSE LINUX 10.1, openSUSE 10.2, SUSE SLED 10, SUSE SLES 10
Solution
Solution
Please Install the Updated Packages.