openSUSE 安全更新:krb5 (openSUSE-2016-181)

high Nessus 插件 ID 88687

简介

远程 openSUSE 主机缺少安全更新。

描述

此 krb5 更新修复了以下问题:

- CVE-2015-8629:具有修改数据库权限的经认证攻击者导致的信息泄漏 (bsc#963968)

- CVE-2015-8630:具有修改主体条目权限的经认证攻击者可能已造成 kadmind 崩溃 (bsc#963964)

- CVE-2015-8631:经认证的攻击者可能通过在请求中提供空主体名称,造成 auditd 的内存泄漏 (bsc#963975)

解决方案

更新受影响的 krb5 程序包。

另见

https://bugzilla.opensuse.org/show_bug.cgi?id=963964

https://bugzilla.opensuse.org/show_bug.cgi?id=963968

https://bugzilla.opensuse.org/show_bug.cgi?id=963975

插件详情

严重性: High

ID: 88687

文件名: openSUSE-2016-181.nasl

版本: 2.5

类型: local

代理: unix

发布时间: 2016/2/11

最近更新时间: 2021/1/19

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

风险信息

VPR

风险因素: Low

分数: 3.6

CVSS v2

风险因素: Medium

基本分数: 6.8

矢量: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

CVSS v3

风险因素: High

基本分数: 7.5

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

漏洞信息

CPE: p-cpe:/a:novell:opensuse:krb5, p-cpe:/a:novell:opensuse:krb5-32bit, p-cpe:/a:novell:opensuse:krb5-client, p-cpe:/a:novell:opensuse:krb5-client-debuginfo, p-cpe:/a:novell:opensuse:krb5-debuginfo, p-cpe:/a:novell:opensuse:krb5-debuginfo-32bit, p-cpe:/a:novell:opensuse:krb5-debugsource, p-cpe:/a:novell:opensuse:krb5-devel, p-cpe:/a:novell:opensuse:krb5-devel-32bit, p-cpe:/a:novell:opensuse:krb5-mini, p-cpe:/a:novell:opensuse:krb5-mini-debuginfo, p-cpe:/a:novell:opensuse:krb5-mini-debugsource, p-cpe:/a:novell:opensuse:krb5-mini-devel, p-cpe:/a:novell:opensuse:krb5-plugin-kdb-ldap, p-cpe:/a:novell:opensuse:krb5-plugin-kdb-ldap-debuginfo, p-cpe:/a:novell:opensuse:krb5-plugin-preauth-otp, p-cpe:/a:novell:opensuse:krb5-plugin-preauth-otp-debuginfo, p-cpe:/a:novell:opensuse:krb5-plugin-preauth-pkinit, p-cpe:/a:novell:opensuse:krb5-plugin-preauth-pkinit-debuginfo, p-cpe:/a:novell:opensuse:krb5-server, p-cpe:/a:novell:opensuse:krb5-server-debuginfo, cpe:/o:novell:opensuse:13.2

必需的 KB 项: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

补丁发布日期: 2016/2/10

参考资料信息

CVE: CVE-2015-8629, CVE-2015-8630, CVE-2015-8631