Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-001.txt http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-002.txt http://www.vuxml.org/freebsd/9ac0f9c4-492b-11df-83fb-0015587e2cc1.html
Insight
The following package is affected: krb5
CVE-2010-0283
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.
CVE-2010-0628
The spnego_gss_accept_sec_context function in
lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2 and 1.8 before 1.8.1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid packet that triggers incorrect preparation of an error token.
Severity
Classification
-
CVE CVE-2010-0283, CVE-2010-0628 -
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities