You are here

U-070:Redhat krb5 Critical Security Update

December 28, 2011 - 8:30am

Addthis

PROBLEM:

redhat krb5 Critical Security Update

PLATFORM:

RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)

ABSTRACT:

Vulnerability can be exploited by malicious people to compromise a vulnerable system.

REFERENCEĀ  LINKS:

RHSA-2011:1851-2
MITKRB5-SA-2011-008
Secunia Advisory: SA47357
Secunia Advisory: SA47359
RH Bugzilla: 770325
CVE-2011-4862
JC3-CIRC Tech Bulletin U-069

IMPACT ASSESSMENT:

High

Discussion:

krb5 telnet daemon is not enabled by default in any version of Red Hat Enterprise Linux. In addition, the default firewall rules block remote access to the telnet port. This flaw does not affect the telnet daemon distributed in the telnet-server package.
For users who have installed the krb5-workstation package, have enabled the telnet daemon, and have it accessible remotely, this update should be applied immediately.
All krb5-workstation users should upgrade to these updated packages, which contain a backported patch to correct this issue.

Impact:

A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd) as shipped with all supported versions of Red Hat Enterprise Linux. A remote attacker who can access the telnet port of a target machine could use this flaw to execute arbitrary code as root.

Solution:

Red Hat is working on an updated packages to address this flaw. For users who have enabled the krb5 telnet daemon and have it accessible remotely, they should disable it until Red Hat provide updated packages to correct this flaw. Red Hat Support
Update Red Hat or apply patch. Red Hat Security Patches
Update to krb5 version 1.8. Apply patch for krb5-appl. Kerberos Releases

Addthis