Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Critical: krb5-appl on SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Tuesday 27th December 2011 18:02:33 UTC (over 5 years ago)
Synopsis:    Critical: krb5-appl security update
Issue Date:  2011-12-27
CVE Numbers: CVE-2011-4862


The krb5-appl packages provide Kerberos-aware telnet, ftp, rcp, rsh, and
rlogin clients and servers. Kerberos is a network authentication system
which allows clients and servers to authenticate to each other using
symmetric encryption and a trusted third-party, the Key Distribution Center
(KDC).

A buffer overflow flaw was found in the MIT krb5 telnet daemon
(telnetd). A remote attacker who can access the telnet port of a
target machine could use this flaw to execute arbitrary code as
root. (CVE-2011-4862)

Note that the krb5 telnet daemon is not enabled by default in any
version of Scientific Linux. In addition, the default firewall
rules block remote access to the telnet port. This flaw does not
affect the telnet daemon distributed in the telnet-server package.

For users who have installed the krb5-appl-servers package, have
enabled the krb5 telnet daemon, and have it accessible remotely, this
update should be applied immediately.

All krb5-appl-server users should upgrade to these updated packages,
which contain a backported patch to correct this issue.

SL6:
  i386
     krb5-appl-clients-1.0.1-7.el6_2.i686.rpm
     krb5-appl-debuginfo-1.0.1-7.el6_2.i686.rpm
     krb5-appl-servers-1.0.1-7.el6_2.i686.rpm
  x86_64
     krb5-appl-clients-1.0.1-7.el6_2.x86_64.rpm
     krb5-appl-debuginfo-1.0.1-7.el6_2.x86_64.rpm
     krb5-appl-servers-1.0.1-7.el6_2.x86_64.rpm

- Scientific Linux Development Team
 
CD: 3ms