CentOS 4 / 5 : krb5 (CESA-2010:0926)

medium Nessus Plugin ID 50863

Language:

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated krb5 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third party, the Key Distribution Center (KDC).

Multiple checksum validation flaws were discovered in the MIT Kerberos implementation. A remote attacker could use these flaws to tamper with certain Kerberos protocol packets and, possibly, bypass authentication mechanisms in certain configurations using Single-use Authentication Mechanisms. (CVE-2010-1323)

Red Hat would like to thank the MIT Kerberos Team for reporting these issues.

All krb5 users should upgrade to these updated packages, which contain a backported patch to correct these issues. After installing the updated packages, the krb5kdc daemon will be restarted automatically.

Solution

Update the affected krb5 packages.

See Also

http://www.nessus.org/u?1101683e

http://www.nessus.org/u?c52d1cc0

http://www.nessus.org/u?6ce3d4fe

http://www.nessus.org/u?39a4485d

Plugin Details

Severity: Medium

ID: 50863

File Name: centos_RHSA-2010-0926.nasl

Version: 1.19

Type: local

Agent: unix

Published: 12/2/2010

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Azure, Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:krb5-devel, p-cpe:/a:centos:centos:krb5-libs, p-cpe:/a:centos:centos:krb5-server, p-cpe:/a:centos:centos:krb5-workstation, cpe:/o:centos:centos:4, cpe:/o:centos:centos:5

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/1/2010

Vulnerability Publication Date: 12/2/2010

Reference Information

CVE: CVE-2010-1323, CVE-2010-1324, CVE-2010-4020, CVE-2010-4021

BID: 45118

RHSA: 2010:0926