漏洞信息详情
多个厂商Kerberos 5/Kerberos 4 兼容问题的krb_rd_req()函数的缓冲区溢出漏洞
漏洞简介
Kerberos 5中的ksu存在缓冲区溢出漏洞,远程攻击者可以利用这个漏洞获取根权限。
漏洞公告
MIT will release krb5-1.2 shortly, which will remedy these problems in the MIT codebase. Patches are available against krb5-1.0.x., and krb5-1.1.1 Users upgrading to krb5-1.1.1 and compiling with the --without-krb4 option also need to apply patches against the login program to prevent a dangling else clause. Removing the setuid bit on the v4rcp binary will eliminate that specific vulnerability under RedHat Linux 6.2. It will not remove additional problems present if Kerberos is installed. Any users still using FreeBSD 2.2.5 and who have installed the optional Kerberos distribution are urged to upgrade to 2.2.8-STABLE or later. Note however that FreeBSD 2.x is no longer an officially supported version, nor are security fixes always provided. RedHat has released patches. See the RedHat advisory http://www.redhat.com/support/errata/RHSA-2000-025.html MIT Kerberos 5 5.0 -1.0.x
- MIT krb5-1.0.x.patch http://www.securityfocus.com/data/vulnerabilities/patches/krb5-1.0.x.p atch
- MIT krb5-1.1.1.patch http://www.securityfocus.com/data/vulnerabilities/patches/krb5-1.1.1.p atch
参考网址
来源:CERT/CC Advisory: CA-2000-06 名称: CA-2000-06 链接:http://www.cert.org/advisories/CA-2000-06.html 来源: BID 名称: 1220 链接:http://www.securityfocus.com/bid/1220 来源: REDHAT 名称: RHSA-2000:025 链接:http://www.redhat.com/support/errata/RHSA-2000-025.html 来源: OSVDB 名称: 4876 链接:http://www.osvdb.org/4876 来源: FREEBSD 名称: FreeBSD-SA-00:20 链接:http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html 来源: BUGTRAQ 名称: 20000516 BUFFER OVERRUN VULNERABILITIES IN KERBEROS 链接:http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html
受影响实体
- Cygnus Cygnus_network_security:4.0<!--2000-1-1-->
- Cygnus Kerbnet:5.0<!--2000-1-1-->
补丁
- 多个厂商Kerberos 5/Kerberos 4 兼容问题的krb_rd_req()函数的缓冲区错误漏洞的修复措施<!--2000-5-16-->
还没有评论,来说两句吧...