AnNyung Official Homepage Home > Update [ 1.3 ]  

HOME
What is AnNyung
Documents
Packages System
White Paper
Download
Update
  . 3.x [RSS]
  . 2.x [RSS]
  . 1.3 [RSS]
  . 1.2 [RSS]
  . 1.1 [RSS]
  . 1.0 [RSS]
FAQ
Hardware
RoadMap
Gallery

  Go oops.org
  AnNyung banner 88x31

  AnNyung 1 banner 80x15
  AnNyung 2 banner 80x15
  AnNyung 3 banner 80x15
  AnNyung banner 80x15
  AnNyung banner 80x15



krb5 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.

문서번호 : 1350738764
업데이트 : 2012.10.20


상세내용

1.3.4-65.el4 update

- fixed CVE-2010-1323
- fixed CVE-2011-4862

. CVE-2010-1323:
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and
1.8.x through 1.8.3 does not properly determine the acceptability
of checksums, which might allow remote attackers to modify
user-visible prompt text, modify a response to a Key Distribution
Center (KDC), or forge a KRB-SAFE message via certain checksums
that (1) are unkeyed or (2) use RC4 keys.

. CVE-2011-4862:
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3
through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl)
1.0.2 and earlier, and Heimdal 1.5.1 and earlier allows remote
attackers to execute arbitrary code via a long encryption key,
as exploited in the wild in December 2011.


Autoupdates 지원 : Packages System
  pkgadd -F "krb5*"


update 패키지

  RPMS :

    . krb5-libs-1.3.4-65.el4.i686.rpm
    . krb5-server-1.3.4-65.el4.i686.rpm
    . krb5-workstation-1.3.4-65.el4.i686.rpm
    . krb5-devel-1.3.4-65.el4.i686.rpm

  SRPMS :

    . krb5-1.3.4-65.el4.src.rpm


참고 :
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862



    



 Home > Update [ 1.3 ]

Copyright 2018 OOPS Development Organization 
LAST MODIFIED: 2018/04/10