openSUSE Security Update : krb5 (openSUSE-SU-2013:0904-1)

medium Nessus Plugin ID 74989

Synopsis

The remote openSUSE host is missing a security update.

Description

- fix prep_reprocess_req NULL pointer deref CVE-2013-1416 (bnc#816413) bug-816413-CVE-2013-1416-prep_reprocess_req-NULL-ptr-der ef.dif

Solution

Update the affected krb5 packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=816413

https://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html

https://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html

Plugin Details

Severity: Medium

ID: 74989

File Name: openSUSE-2013-401.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:krb5-plugin-kdb-ldap-debuginfo, p-cpe:/a:novell:opensuse:krb5-mini, p-cpe:/a:novell:opensuse:krb5-plugin-kdb-ldap, cpe:/o:novell:opensuse:12.1, p-cpe:/a:novell:opensuse:krb5-plugin-preauth-pkinit, p-cpe:/a:novell:opensuse:krb5-debuginfo, cpe:/o:novell:opensuse:12.3, p-cpe:/a:novell:opensuse:krb5-server, p-cpe:/a:novell:opensuse:krb5, p-cpe:/a:novell:opensuse:krb5-debuginfo-32bit, p-cpe:/a:novell:opensuse:krb5-debugsource, p-cpe:/a:novell:opensuse:krb5-server-debuginfo, p-cpe:/a:novell:opensuse:krb5-devel, p-cpe:/a:novell:opensuse:krb5-client-debuginfo, p-cpe:/a:novell:opensuse:krb5-devel-32bit, p-cpe:/a:novell:opensuse:krb5-mini-debugsource, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:krb5-client, p-cpe:/a:novell:opensuse:krb5-mini-devel, p-cpe:/a:novell:opensuse:krb5-mini-debuginfo, p-cpe:/a:novell:opensuse:krb5-plugin-preauth-pkinit-debuginfo, p-cpe:/a:novell:opensuse:krb5-32bit

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 4/22/2013

Reference Information

CVE: CVE-2013-1416

BID: 59261