Lucene search

K

[SECURITY] [DSA 1146-1] New krb5 packages fix privilege escalation

🗓️ 09 Aug 2006 06:06:10Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 22 Views

New krb5 packages fix privilege escalation. MIT Kerberos 5 source distribution did not check setuid and seteuid calls for success, leading to privilege escalation vulnerabilities. Users are advised to upgrade krb5 packages

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Debian3.1s390krb5-telnetd1.3.6-2sarge3krb5-telnetd_1.3.6-2sarge3_s390.deb
Debian3.1powerpckrb5-user1.3.6-2sarge3krb5-user_1.3.6-2sarge3_powerpc.deb
Debian3.1i386krb5-telnetd1.3.6-2sarge3krb5-telnetd_1.3.6-2sarge3_i386.deb
Debian3.1sparckrb5-admin-server1.3.6-2sarge3krb5-admin-server_1.3.6-2sarge3_sparc.deb
Debian3.1mipslibkrb531.3.6-2sarge3libkrb53_1.3.6-2sarge3_mips.deb
Debian3.1s390krb5-clients1.3.6-2sarge3krb5-clients_1.3.6-2sarge3_s390.deb
Debian3.1hppalibkadm551.3.6-2sarge3libkadm55_1.3.6-2sarge3_hppa.deb
Debian3.1alphakrb5-telnetd1.3.6-2sarge3krb5-telnetd_1.3.6-2sarge3_alpha.deb
Debian3.1sparclibkadm551.3.6-2sarge3libkadm55_1.3.6-2sarge3_sparc.deb
Debian3.1hppakrb5-ftpd1.3.6-2sarge3krb5-ftpd_1.3.6-2sarge3_hppa.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
09 Aug 2006 06:10Current
6.6Medium risk
Vulners AI Score6.6
CVSS27.2
EPSS0.003
22
.json
Report