Mandriva Linux Security Advisory : krb5-appl (MDVSA-2011:195)

critical Nessus Plugin ID 57412

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

A vulnerability has been discovered and corrected in krb5-appl, heimdal and netkit-telnet :

An unauthenticated remote attacker can cause a buffer overflow and probably execute arbitrary code with the privileges of the telnet daemon (CVE-2011-4862).

In Mandriva the telnetd daemon from the netkit-telnet-server package does not have an initscript to start and stop the service, however one could rather easily craft an initscript or start the service by other means rendering the system vulnerable to this issue.

The updated packages have been patched to correct this issue.

Solution

Update the affected packages.

See Also

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt

Plugin Details

Severity: Critical

ID: 57412

File Name: mandriva_MDVSA-2011-195.nasl

Version: 1.13

Type: local

Published: 12/29/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:krb5-appl-clients, p-cpe:/a:mandriva:linux:krb5-appl-servers, p-cpe:/a:mandriva:linux:netkit-telnet, p-cpe:/a:mandriva:linux:netkit-telnet-server, cpe:/o:mandriva:linux:2010.1, cpe:/o:mandriva:linux:2011

Required KB Items: Host/Mandrake/release, Host/Mandrake/rpm-list, Host/local_checks_enabled, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/28/2011

Exploitable With

Core Impact

Metasploit (Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow)

ExploitHub (EH-11-760)

Reference Information

CVE: CVE-2011-4862

MDVSA: 2011:195