Rapid7 Vulnerability & Exploit Database

CESA-2003:021: krb5 security update

Back to Search

CESA-2003:021: krb5 security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/19/2003
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated packages fix a vulnerability found in the Kerberos FTP client distributed with the CentOS Linux Advanced Server krb5 packages. [Updated 06 Feb 2003] Added fixed packages for Advanced Workstation 2.1. For Advanced Workstation 2.1 these packages also fix CAN-2002-1235 as described in RHSA-2002:250

Kerberos is a network authentication system. A problem has been found in the Kerberos FTP client. When retrieving a file with a name beginning with a pipe character, the FTP client will pass the file name to the command shell in a system() call. This could allow a malicious FTP server to write to files outside of the current directory or execute commands as the user running the FTP client. The Kerberos FTP client runs as the default FTP client when the Kerberos package krb5-workstation is installed on a CentOS Linux Advanced Server distribution. All users of Kerberos are advised to upgrade to these errata packages which contain a backported patch and are not vulnerable to this issue.

Solution(s)

  • centos-upgrade-krb5-devel
  • centos-upgrade-krb5-libs
  • centos-upgrade-krb5-server
  • centos-upgrade-krb5-workstation

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;