A+ R A-

U-070: Redhat krb5 Critical Security Update

U-070:Redhat krb5 Critical Security Update
Privacy and Legal Notice


December 28, 2011 8:30 AM ET


Redhat krb5 Critical Security Update


RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)


Vulnerability can be exploited by malicious people to compromise a vulnerable system.



krb5 telnet daemon is not enabled by default in any version of Red Hat Enterprise Linux. In addition, the default firewall rules block remote access to the telnet port. This flaw does not affect the telnet daemon distributed in the telnet-server package.
For users who have installed the krb5-workstation package, have enabled the telnet daemon, and have it accessible remotely, this update should be applied immediately.
All krb5-workstation users should upgrade to these updated packages, which contain a backported patch to correct this issue.

A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd) as shipped with all supported versions of Red Hat Enterprise Linux. A remote attacker who can access the telnet port of a target machine could use this flaw to execute arbitrary code as root.

Red Hat is working on an updated packages to address this flaw. For users who have enabled the krb5 telnet daemon and have it accessible remotely, they should disable it until Red Hat provide updated packages to correct this flaw. Red Hat Support[2]
Update Red Hat or apply patch. Red Hat Security Patches[3]
Update to krb5 version 1.8. Apply patch for krb5-appl. Kerberos Releases[4]

  1. ^ Privacy and Legal Notice (www.energy.gov)
  2. ^ Red Hat Support (access.redhat.com)
  3. ^ Red Hat Security Patches (access.redhat.com)
  4. ^ Kerberos Releases (web.mit.edu)

Authors: JC3-CIRC

Read Full Article @ Source

Got News?

Get email updates