Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

SuSE Update for krb5 SUSE-SA:2007:025

Information

Severity

Severity

Critical

Family

Family

SuSE Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

15 years ago

Modified

Modified

6 years ago

Summary

Check for the Version of krb5

Insight

Insight

The krb5 telnet daemon allowed remote attackers to skip authentication and gain root access CVE-2007-0956 A bug in the function krb5_klog_syslog() leads to a buffer overflow which could be exploited to execute arbitrary code CVE-2007-0957. A double-free bug in the GSS-API library could crash kadmind. It's potentially also exploitable to execute arbitrary code CVE-2007-1216.

Affected Software

Affected Software

krb5 on SUSE LINUX 10.1, openSUSE 10.2, SUSE SLED 10, SUSE SLES 10

Solution

Solution

Please Install the Updated Packages.

Common Vulnerabilities and Exposures (CVE)