SCIENTIFIC-LINUX-ERRATA Archives

December 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Tue, 27 Dec 2011 12:02:33 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (40 lines)
Synopsis:    Critical: krb5-appl security update
Issue Date:  2011-12-27
CVE Numbers: CVE-2011-4862


The krb5-appl packages provide Kerberos-aware telnet, ftp, rcp, rsh, and
rlogin clients and servers. Kerberos is a network authentication system
which allows clients and servers to authenticate to each other using
symmetric encryption and a trusted third-party, the Key Distribution Center
(KDC).

A buffer overflow flaw was found in the MIT krb5 telnet daemon
(telnetd). A remote attacker who can access the telnet port of a
target machine could use this flaw to execute arbitrary code as
root. (CVE-2011-4862)

Note that the krb5 telnet daemon is not enabled by default in any
version of Scientific Linux. In addition, the default firewall
rules block remote access to the telnet port. This flaw does not
affect the telnet daemon distributed in the telnet-server package.

For users who have installed the krb5-appl-servers package, have
enabled the krb5 telnet daemon, and have it accessible remotely, this
update should be applied immediately.

All krb5-appl-server users should upgrade to these updated packages,
which contain a backported patch to correct this issue.

SL6:
  i386
     krb5-appl-clients-1.0.1-7.el6_2.i686.rpm
     krb5-appl-debuginfo-1.0.1-7.el6_2.i686.rpm
     krb5-appl-servers-1.0.1-7.el6_2.i686.rpm
  x86_64
     krb5-appl-clients-1.0.1-7.el6_2.x86_64.rpm
     krb5-appl-debuginfo-1.0.1-7.el6_2.x86_64.rpm
     krb5-appl-servers-1.0.1-7.el6_2.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2