⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deb_266_1.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 266-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53337); script_cve_id("CVE-2003-0028", "CVE-2003-0072", "CVE-2003-0138", "CVE-2003-0139"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 266-1 (krb5)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to krb5announced via advisory DSA 266-1.Several vulnerabilities have been discovered in krb5, animplementation of MIT Kerberos.. A cryptographic weakness in version 4 of the Kerberos protocolallows an attacker to use a chosen-plaintext attack to impersonateany principal in a realm.  Additional cryptographic weaknesses inthe krb4 implementation included in the MIT krb5 distributionpermit the use of cut-and-paste attacks to fabricate krb4 ticketsfor unauthorized client principals if triple-DES keys are used tokey krb4 services.  These attacks can subvert a site's entireKerberos authentication infrastructure.Kerberos version 5 does not contain this cryptographicvulnerability.  Sites are not vulnerable if they have Kerberos v4completely disabled, including the disabling of any krb5 to krb4translation services.. The MIT Kerberos 5 implementation includes an RPC library derivedfrom SUNRPC.  The implementation contains length checks, that arevulnerable to an integer overflow, which may be exploitable tocreate denials of service or to gain unauthorized access tosensitive information.. Buffer overrun and underrun problems exist in Kerberos principalname handling in unusual cases, such as names with zero components,names with one empty component, or host-based service principalnames with no host name component.For the stable distribution (woody) this problem has beenfixed in version 1.2.4-5woody4.The old stable distribution (potato) does not contain krb5 packages.For the unstable distribution (sid) this problem will be fixed soon.We recommend that you upgrade your krb5 package.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20266-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 266-1 (krb5)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"krb5-doc", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"krb5-admin-server", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"krb5-clients", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"krb5-ftpd", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"krb5-kdc", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"krb5-rsh-server", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"krb5-telnetd", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"krb5-user", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"libkadm55", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"libkrb5-dev", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(isdpkgvuln(pkg:"libkrb53", ver:"1.2.4-5woody4", rls:"DEB3.0")) {    vuln = 1;}if(vuln) {    security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -