RHSA-2011:1854
Vulnerability from csaf_redhat
Published
2011-12-28 19:05
Modified
2024-11-22 04:56
Summary
Red Hat Security Advisory: krb5-appl security update

Notes

Topic
Updated krb5-appl packages that fix one security issue are now available for Red Hat Enterprise Linux 6.0 and 6.1 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
Details
The krb5-appl packages provide Kerberos-aware telnet, ftp, rcp, rsh, and rlogin clients and servers. Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third-party, the Key Distribution Center (KDC). A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd). A remote attacker who can access the telnet port of a target machine could use this flaw to execute arbitrary code as root. (CVE-2011-4862) Note that the krb5 telnet daemon is not enabled by default in any version of Red Hat Enterprise Linux. In addition, the default firewall rules block remote access to the telnet port. This flaw does not affect the telnet daemon distributed in the telnet-server package. For users who have installed the krb5-appl-servers package, have enabled the krb5 telnet daemon, and have it accessible remotely, this update should be applied immediately. All krb5-appl-server users should upgrade to these updated packages, which contain a backported patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated krb5-appl packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6.0 and 6.1 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The krb5-appl packages provide Kerberos-aware telnet, ftp, rcp, rsh, and\nrlogin clients and servers. Kerberos is a network authentication system\nwhich allows clients and servers to authenticate to each other using\nsymmetric encryption and a trusted third-party, the Key Distribution Center\n(KDC).\n\nA buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd).\nA remote attacker who can access the telnet port of a target machine could\nuse this flaw to execute arbitrary code as root. (CVE-2011-4862) \n\nNote that the krb5 telnet daemon is not enabled by default in any version\nof Red Hat Enterprise Linux. In addition, the default firewall rules block\nremote access to the telnet port. This flaw does not affect the telnet\ndaemon distributed in the telnet-server package.\n\nFor users who have installed the krb5-appl-servers package, have enabled\nthe krb5 telnet daemon, and have it accessible remotely, this update should\nbe applied immediately. \n\nAll krb5-appl-server users should upgrade to these updated packages, which\ncontain a backported patch to correct this issue.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:1854",
        "url": "https://access.redhat.com/errata/RHSA-2011:1854"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#critical",
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "category": "external",
        "summary": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt",
        "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt"
      },
      {
        "category": "external",
        "summary": "770325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1854.json"
      }
    ],
    "title": "Red Hat Security Advisory: krb5-appl security update",
    "tracking": {
      "current_release_date": "2024-11-22T04:56:21+00:00",
      "generator": {
        "date": "2024-11-22T04:56:21+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2011:1854",
      "initial_release_date": "2011-12-28T19:05:00+00:00",
      "revision_history": [
        {
          "date": "2011-12-28T19:05:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-12-28T19:10:32+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T04:56:21+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 6.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 6.0)",
                  "product_id": "6Server-6.0.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 6.1)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 6.1)",
                  "product_id": "6Server-6.1.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-appl-0:1.0.1-1.el6_0.1.src",
                "product": {
                  "name": "krb5-appl-0:1.0.1-1.el6_0.1.src",
                  "product_id": "krb5-appl-0:1.0.1-1.el6_0.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl@1.0.1-1.el6_0.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-0:1.0.1-2.el6_1.3.src",
                "product": {
                  "name": "krb5-appl-0:1.0.1-2.el6_1.3.src",
                  "product_id": "krb5-appl-0:1.0.1-2.el6_1.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl@1.0.1-2.el6_1.3?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.i686",
                "product": {
                  "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.i686",
                  "product_id": "krb5-appl-servers-0:1.0.1-1.el6_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-servers@1.0.1-1.el6_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.i686",
                "product": {
                  "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.i686",
                  "product_id": "krb5-appl-clients-0:1.0.1-1.el6_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-clients@1.0.1-1.el6_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686",
                "product": {
                  "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686",
                  "product_id": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-debuginfo@1.0.1-1.el6_0.1?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.i686",
                "product": {
                  "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.i686",
                  "product_id": "krb5-appl-clients-0:1.0.1-2.el6_1.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-clients@1.0.1-2.el6_1.3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686",
                "product": {
                  "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686",
                  "product_id": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-debuginfo@1.0.1-2.el6_1.3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.i686",
                "product": {
                  "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.i686",
                  "product_id": "krb5-appl-servers-0:1.0.1-2.el6_1.3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-servers@1.0.1-2.el6_1.3?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64",
                "product": {
                  "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64",
                  "product_id": "krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-servers@1.0.1-1.el6_0.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64",
                "product": {
                  "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64",
                  "product_id": "krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-clients@1.0.1-1.el6_0.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64",
                "product": {
                  "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64",
                  "product_id": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-debuginfo@1.0.1-1.el6_0.1?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64",
                "product": {
                  "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64",
                  "product_id": "krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-clients@1.0.1-2.el6_1.3?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64",
                "product": {
                  "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64",
                  "product_id": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-debuginfo@1.0.1-2.el6_1.3?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64",
                "product": {
                  "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64",
                  "product_id": "krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-servers@1.0.1-2.el6_1.3?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x",
                "product": {
                  "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x",
                  "product_id": "krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-servers@1.0.1-1.el6_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x",
                "product": {
                  "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x",
                  "product_id": "krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-clients@1.0.1-1.el6_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x",
                "product": {
                  "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x",
                  "product_id": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-debuginfo@1.0.1-1.el6_0.1?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x",
                "product": {
                  "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x",
                  "product_id": "krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-clients@1.0.1-2.el6_1.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x",
                "product": {
                  "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x",
                  "product_id": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-debuginfo@1.0.1-2.el6_1.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x",
                "product": {
                  "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x",
                  "product_id": "krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-servers@1.0.1-2.el6_1.3?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64",
                "product": {
                  "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64",
                  "product_id": "krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-servers@1.0.1-1.el6_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64",
                "product": {
                  "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64",
                  "product_id": "krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-clients@1.0.1-1.el6_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64",
                "product": {
                  "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64",
                  "product_id": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-debuginfo@1.0.1-1.el6_0.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64",
                "product": {
                  "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64",
                  "product_id": "krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-clients@1.0.1-2.el6_1.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64",
                "product": {
                  "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64",
                  "product_id": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-debuginfo@1.0.1-2.el6_1.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64",
                "product": {
                  "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64",
                  "product_id": "krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-appl-servers@1.0.1-2.el6_1.3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-0:1.0.1-1.el6_0.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-0:1.0.1-1.el6_0.1.src"
        },
        "product_reference": "krb5-appl-0:1.0.1-1.el6_0.1.src",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.i686"
        },
        "product_reference": "krb5-appl-clients-0:1.0.1-1.el6_0.1.i686",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64"
        },
        "product_reference": "krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x"
        },
        "product_reference": "krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64"
        },
        "product_reference": "krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686"
        },
        "product_reference": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64"
        },
        "product_reference": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x"
        },
        "product_reference": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64"
        },
        "product_reference": "krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.i686"
        },
        "product_reference": "krb5-appl-servers-0:1.0.1-1.el6_0.1.i686",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64"
        },
        "product_reference": "krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x"
        },
        "product_reference": "krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.0)",
          "product_id": "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64"
        },
        "product_reference": "krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64",
        "relates_to_product_reference": "6Server-6.0.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-0:1.0.1-2.el6_1.3.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-0:1.0.1-2.el6_1.3.src"
        },
        "product_reference": "krb5-appl-0:1.0.1-2.el6_1.3.src",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.i686"
        },
        "product_reference": "krb5-appl-clients-0:1.0.1-2.el6_1.3.i686",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64"
        },
        "product_reference": "krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x"
        },
        "product_reference": "krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64"
        },
        "product_reference": "krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686"
        },
        "product_reference": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64"
        },
        "product_reference": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x"
        },
        "product_reference": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64"
        },
        "product_reference": "krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.i686"
        },
        "product_reference": "krb5-appl-servers-0:1.0.1-2.el6_1.3.i686",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64"
        },
        "product_reference": "krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x"
        },
        "product_reference": "krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x",
        "relates_to_product_reference": "6Server-6.1.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.1)",
          "product_id": "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64"
        },
        "product_reference": "krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64",
        "relates_to_product_reference": "6Server-6.1.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-4862",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2011-12-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "770325"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: telnet client and server encrypt_keyid heap-based buffer overflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "A buffer overflow flaw was found in the MIT krb5 telnet daemon (telnetd) as shipped with all supported versions of Red Hat Enterprise Linux. A remote attacker who can access the telnet port of a target machine could use this flaw to execute arbitrary code as root.\n\nWhile we are aware of public exploits for this issue that include targets for Red Hat Enterprise Linux 3, we are not aware of any yet which would be successful in gaining arbitrary root code execution in Red Hat Enterprise Linux 4, 5, or 6.  However it is plausible that one could be created to do so.\n\nNote that the krb5 telnet daemon is not enabled by default in any version of Red Hat Enterprise Linux. In addition, the default firewall rules block remote access to the telnet port. This flaw does not affect the telnet daemon distributed in the telnet-server package.\n\nFor users who have enabled the krb5 telnet daemon and have it accessible remotely, they should disable it or apply the updates we have released.\n\nSince same encryption code is shared between the MIT krb5 telnet daemon and the telnet client, this issue affects the telnet client as well. The updates we have released fixes the issue for both, the telnet daemon and the telnet client.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-6.0.z:krb5-appl-0:1.0.1-1.el6_0.1.src",
          "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.i686",
          "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64",
          "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x",
          "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64",
          "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686",
          "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64",
          "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x",
          "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64",
          "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.i686",
          "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64",
          "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x",
          "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64",
          "6Server-6.1.EUS:krb5-appl-0:1.0.1-2.el6_1.3.src",
          "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.i686",
          "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64",
          "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x",
          "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64",
          "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686",
          "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64",
          "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x",
          "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64",
          "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.i686",
          "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64",
          "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x",
          "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-4862"
        },
        {
          "category": "external",
          "summary": "RHBZ#770325",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4862",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-4862"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4862",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4862"
        }
      ],
      "release_date": "2011-12-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-12-28T19:05:00+00:00",
          "details": "The krb5 telnet daemon is an xinetd service. You can determine if krb5\ntelnetd is enabled with the commands:\n\n/sbin/chkconfig --list krb5-telnet\n/sbin/chkconfig --list ekrb5-telnet\n\nThe output of these command will display \"on\" if krb5 telnet is enabled.\nkrb5 telnet daemon can be immediately disabled with the commands:\n\n/sbin/chkconfig krb5-telnet off\n/sbin/chkconfig ekrb5-telnet off\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "6Server-6.0.z:krb5-appl-0:1.0.1-1.el6_0.1.src",
            "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.i686",
            "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64",
            "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x",
            "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64",
            "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686",
            "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64",
            "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x",
            "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64",
            "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.i686",
            "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64",
            "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x",
            "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64",
            "6Server-6.1.EUS:krb5-appl-0:1.0.1-2.el6_1.3.src",
            "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.i686",
            "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64",
            "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x",
            "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64",
            "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686",
            "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64",
            "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x",
            "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64",
            "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.i686",
            "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64",
            "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x",
            "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1854"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "6Server-6.0.z:krb5-appl-0:1.0.1-1.el6_0.1.src",
            "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.i686",
            "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.ppc64",
            "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.s390x",
            "6Server-6.0.z:krb5-appl-clients-0:1.0.1-1.el6_0.1.x86_64",
            "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.i686",
            "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.ppc64",
            "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.s390x",
            "6Server-6.0.z:krb5-appl-debuginfo-0:1.0.1-1.el6_0.1.x86_64",
            "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.i686",
            "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.ppc64",
            "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.s390x",
            "6Server-6.0.z:krb5-appl-servers-0:1.0.1-1.el6_0.1.x86_64",
            "6Server-6.1.EUS:krb5-appl-0:1.0.1-2.el6_1.3.src",
            "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.i686",
            "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.ppc64",
            "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.s390x",
            "6Server-6.1.EUS:krb5-appl-clients-0:1.0.1-2.el6_1.3.x86_64",
            "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.i686",
            "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.ppc64",
            "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.s390x",
            "6Server-6.1.EUS:krb5-appl-debuginfo-0:1.0.1-2.el6_1.3.x86_64",
            "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.i686",
            "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.ppc64",
            "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.s390x",
            "6Server-6.1.EUS:krb5-appl-servers-0:1.0.1-2.el6_1.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "krb5: telnet client and server encrypt_keyid heap-based buffer overflow"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.