Executive Summary
Summary | |
---|---|
Title | MIT Kerberos 5: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201201-13 | First vendor Publication | 2012-01-23 |
Vendor | Gentoo | Last vendor Modification | 2012-01-23 |
Severity (Vendor) | High | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities have been found in MIT Kerberos 5, the most severe of which may allow remote execution of arbitrary code. Background Description Impact Workaround Resolution References Availability http://security.gentoo.org/glsa/glsa-201201-13.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201201-13.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-20 | Improper Input Validation |
20 % | CWE-310 | Cryptographic Issues |
15 % | CWE-399 | Resource Management Errors |
5 % | CWE-476 | NULL Pointer Dereference |
5 % | CWE-416 | Use After Free |
5 % | CWE-264 | Permissions, Privileges, and Access Controls |
5 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
5 % | CWE-16 | Configuration |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11272 | |||
Oval ID: | oval:org.mitre.oval:def:11272 | ||
Title: | Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid. | ||
Description: | Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4212 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11604 | |||
Oval ID: | oval:org.mitre.oval:def:11604 | ||
Title: | The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing. | ||
Description: | The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1321 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11936 | |||
Oval ID: | oval:org.mitre.oval:def:11936 | ||
Title: | HP-UX Running Kerberos, Remote Unauthorized Modification. | ||
Description: | MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1324 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12121 | |||
Oval ID: | oval:org.mitre.oval:def:12121 | ||
Title: | HP-UX Running Kerberos, Remote Unauthorized Modification. | ||
Description: | MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1323 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12131 | |||
Oval ID: | oval:org.mitre.oval:def:12131 | ||
Title: | DSA-2129-1 krb5 -- checksum verification weakness | ||
Description: | A vulnerability has been found in krb5, the MIT implementation of Kerberos. MIT krb5 clients incorrectly accept an unkeyed checksums in the SAM-2 preauthentication challenge: An unauthenticated remote attacker could alter a SAM-2 challenge, affecting the prompt text seen by the user or the kind of response sent to the KDC. Under some circumstances, this can negate the incremental security benefit of using a single-use authentication mechanism token. MIT krb5 incorrectly accepts RFC 3961 key-derivation checksums using RC4 keys when verifying KRB-SAFE messages: An unauthenticated remote attacker has a 1/256 chance of forging KRB-SAFE messages in an application protocol if the targeted pre-existing session uses an RC4 session key. Few application protocols use KRB-SAFE messages. The Common Vulnerabilities and Exposures project has assigned CVE-2010-1323 to these issues. For the stable distribution, these problems have been fixed in version 1.6.dfsg.4~beta1-5lenny6. The builds for the mips architecture are not included in this advisory. They will be released as soon as they are available. For the testing distribution and the unstable distribution, these problem have been fixed in version 1.8.3+dfsg-3. We recommend that you upgrade your krb5 packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2129-1 CVE-2010-1323 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13037 | |||
Oval ID: | oval:org.mitre.oval:def:13037 | ||
Title: | USN-1116-1 -- krb5 vulnerability | ||
Description: | krb5: MIT Kerberos services An unauthenticated remote user could crash the Kerberos service. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1116-1 CVE-2011-0285 | Version: | 5 |
Platform(s): | Ubuntu 10.10 Ubuntu 9.10 Ubuntu 10.04 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:14768 | |||
Oval ID: | oval:org.mitre.oval:def:14768 | ||
Title: | DSA-2379-1 krb5 -- several | ||
Description: | It was discovered that the Key Distribution Center in Kerberos 5 crashes when processing certain crafted requests: CVE-2011-1528 When the LDAP backend is used, remote users can trigger a KDC daemon crash and denial of service. CVE-2011-1529 When the LDAP or Berkeley DB backend is used, remote users can trigger a NULL pointer dereference in the KDC daemon and a denial of service. The oldstable distribution is not affected by these problems. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2379-1 CVE-2011-1528 CVE-2011-1529 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | krb5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:15363 | |||
Oval ID: | oval:org.mitre.oval:def:15363 | ||
Title: | USN-1290-1 -- Kerberos vulnerability | ||
Description: | krb5: MIT Kerberos Network Authentication Protocol The Kerberos Key Distribution Center could be made to crash. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1290-1 CVE-2011-1530 | Version: | 5 |
Platform(s): | Ubuntu 11.10 | Product(s): | Kerberos |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19882 | |||
Oval ID: | oval:org.mitre.oval:def:19882 | ||
Title: | VMware ESX third party updates for Service Console packages glibc and dhcp | ||
Description: | The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-0281 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19888 | |||
Oval ID: | oval:org.mitre.oval:def:19888 | ||
Title: | VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console | ||
Description: | MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1323 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20132 | |||
Oval ID: | oval:org.mitre.oval:def:20132 | ||
Title: | VMware ESX third party updates for Service Console packages glibc and dhcp | ||
Description: | MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1323 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20259 | |||
Oval ID: | oval:org.mitre.oval:def:20259 | ||
Title: | DSA-2031-1 krb5 - denial of service | ||
Description: | Sol Jerome discovered that kadmind service in krb5, a system for authenticating users and services on a network, allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2031-1 CVE-2010-0629 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | krb5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20317 | |||
Oval ID: | oval:org.mitre.oval:def:20317 | ||
Title: | VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console | ||
Description: | MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-4020 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20380 | |||
Oval ID: | oval:org.mitre.oval:def:20380 | ||
Title: | VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX | ||
Description: | The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1321 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20454 | |||
Oval ID: | oval:org.mitre.oval:def:20454 | ||
Title: | VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console | ||
Description: | MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1324 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20477 | |||
Oval ID: | oval:org.mitre.oval:def:20477 | ||
Title: | VMware ESX third party updates for Service Console packages glibc and dhcp | ||
Description: | The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-0282 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20482 | |||
Oval ID: | oval:org.mitre.oval:def:20482 | ||
Title: | VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console | ||
Description: | The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-4021 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20936 | |||
Oval ID: | oval:org.mitre.oval:def:20936 | ||
Title: | RHSA-2011:0200: krb5 security update (Important) | ||
Description: | The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0200-01 CVE-2010-4022 CVE-2011-0281 CVE-2011-0282 | Version: | 42 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21260 | |||
Oval ID: | oval:org.mitre.oval:def:21260 | ||
Title: | USN-1233-1 -- krb5 vulnerabilities | ||
Description: | Several denial of service issues were fixed in the Kerberos Key Distribution Center (KDC). | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1233-1 CVE-2011-1527 CVE-2011-1528 CVE-2011-1529 | Version: | 5 |
Platform(s): | Ubuntu 11.10 Ubuntu 11.04 Ubuntu 10.10 Ubuntu 10.04 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21548 | |||
Oval ID: | oval:org.mitre.oval:def:21548 | ||
Title: | RHSA-2010:0423: krb5 security update (Important) | ||
Description: | The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0423-01 CESA-2010:0423 CVE-2010-1321 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21755 | |||
Oval ID: | oval:org.mitre.oval:def:21755 | ||
Title: | RHSA-2010:0029: krb5 security update (Critical) | ||
Description: | Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0029-02 CESA-2010:0029 CVE-2009-4212 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21789 | |||
Oval ID: | oval:org.mitre.oval:def:21789 | ||
Title: | RHSA-2011:0356: krb5 security update (Important) | ||
Description: | Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0356-01 CVE-2011-0284 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21814 | |||
Oval ID: | oval:org.mitre.oval:def:21814 | ||
Title: | RHSA-2011:0199: krb5 security update (Important) | ||
Description: | The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0199-01 CESA-2011:0199 CVE-2011-0281 CVE-2011-0282 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21874 | |||
Oval ID: | oval:org.mitre.oval:def:21874 | ||
Title: | RHSA-2011:0447: krb5 security update (Moderate) | ||
Description: | The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0447-01 CVE-2011-0285 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21983 | |||
Oval ID: | oval:org.mitre.oval:def:21983 | ||
Title: | RHSA-2010:0925: krb5 security and bug fix update (Important) | ||
Description: | MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0925-01 CVE-2010-1323 CVE-2010-1324 CVE-2010-4020 | Version: | 42 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22017 | |||
Oval ID: | oval:org.mitre.oval:def:22017 | ||
Title: | RHSA-2011:1379: krb5 security update (Moderate) | ||
Description: | The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:1379-01 CVE-2011-1527 CVE-2011-1528 CVE-2011-1529 | Version: | 42 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22037 | |||
Oval ID: | oval:org.mitre.oval:def:22037 | ||
Title: | RHSA-2010:0343: krb5 security and bug fix update (Important) | ||
Description: | Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0343-01 CESA-2010:0343 CVE-2010-0629 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22167 | |||
Oval ID: | oval:org.mitre.oval:def:22167 | ||
Title: | RHSA-2011:1790: krb5 security update (Moderate) | ||
Description: | The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:1790-01 CESA-2011:1790 CVE-2011-1530 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22250 | |||
Oval ID: | oval:org.mitre.oval:def:22250 | ||
Title: | RHSA-2010:0926: krb5 security update (Moderate) | ||
Description: | MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0926-01 CESA-2010:0926 CVE-2010-1323 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22269 | |||
Oval ID: | oval:org.mitre.oval:def:22269 | ||
Title: | RHSA-2010:0863: krb5 security update (Important) | ||
Description: | The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0863-02 CVE-2010-1322 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22659 | |||
Oval ID: | oval:org.mitre.oval:def:22659 | ||
Title: | ELSA-2011:0200: krb5 security update (Important) | ||
Description: | The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0200-01 CVE-2010-4022 CVE-2011-0281 CVE-2011-0282 | Version: | 17 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22784 | |||
Oval ID: | oval:org.mitre.oval:def:22784 | ||
Title: | ELSA-2010:0926: krb5 security update (Moderate) | ||
Description: | MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0926-01 CVE-2010-1323 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22869 | |||
Oval ID: | oval:org.mitre.oval:def:22869 | ||
Title: | ELSA-2010:0029: krb5 security update (Critical) | ||
Description: | Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0029-02 CVE-2009-4212 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23005 | |||
Oval ID: | oval:org.mitre.oval:def:23005 | ||
Title: | ELSA-2010:0343: krb5 security and bug fix update (Important) | ||
Description: | Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0343-01 CVE-2010-0629 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23034 | |||
Oval ID: | oval:org.mitre.oval:def:23034 | ||
Title: | ELSA-2010:0423: krb5 security update (Important) | ||
Description: | The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0423-01 CVE-2010-1321 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23152 | |||
Oval ID: | oval:org.mitre.oval:def:23152 | ||
Title: | ELSA-2011:0447: krb5 security update (Moderate) | ||
Description: | The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0447-01 CVE-2011-0285 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23219 | |||
Oval ID: | oval:org.mitre.oval:def:23219 | ||
Title: | ELSA-2011:0199: krb5 security update (Important) | ||
Description: | The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0199-01 CVE-2011-0281 CVE-2011-0282 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23423 | |||
Oval ID: | oval:org.mitre.oval:def:23423 | ||
Title: | ELSA-2010:0863: krb5 security update (Important) | ||
Description: | The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0863-02 CVE-2010-1322 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23442 | |||
Oval ID: | oval:org.mitre.oval:def:23442 | ||
Title: | ELSA-2011:0356: krb5 security update (Important) | ||
Description: | Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0356-01 CVE-2011-0284 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23502 | |||
Oval ID: | oval:org.mitre.oval:def:23502 | ||
Title: | ELSA-2010:0925: krb5 security and bug fix update (Important) | ||
Description: | MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0925-01 CVE-2010-1323 CVE-2010-1324 CVE-2010-4020 | Version: | 17 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23672 | |||
Oval ID: | oval:org.mitre.oval:def:23672 | ||
Title: | ELSA-2011:1790: krb5 security update (Moderate) | ||
Description: | The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1790-01 CVE-2011-1530 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23734 | |||
Oval ID: | oval:org.mitre.oval:def:23734 | ||
Title: | ELSA-2011:1379: krb5 security update (Moderate) | ||
Description: | The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:1379-01 CVE-2011-1527 CVE-2011-1528 CVE-2011-1529 | Version: | 17 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27169 | |||
Oval ID: | oval:org.mitre.oval:def:27169 | ||
Title: | DEPRECATED: ELSA-2011-1790 -- krb5 security update (moderate) | ||
Description: | [1.9-22.1] - add candidate patch to fix a NULL pointer dereference while processing TGS requests (MITKRB5-SA-2011-007, #754046) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-1790 CVE-2011-1530 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27989 | |||
Oval ID: | oval:org.mitre.oval:def:27989 | ||
Title: | DEPRECATED: ELSA-2011-1379 -- krb5 security update (moderate) | ||
Description: | [1.9-9.2] - apply upstream patch to fix a null pointer derference with the LDAP kdb backend (CVE-2011-1527), an assertion failure with multiple kdb backends (CVE-2011-1528), and a null pointer dereference with multiple kdb backends (CVE-2011-1529) (#740084) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-1379 CVE-2011-1527 CVE-2011-1528 CVE-2011-1529 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28010 | |||
Oval ID: | oval:org.mitre.oval:def:28010 | ||
Title: | DEPRECATED: ELSA-2011-0200 -- krb5 security update (important) | ||
Description: | [1.8.2-3.4] - add upstream patches to fix standalone kpropd exiting if the per-client child process exits with an error, and hang or crash in the KDC when using the LDAP kdb backend (CVE-2010-4022, CVE-2011-0281, CVE-2011-0282, #671101) [1.8.2-3.3] - pull up crypto changes made between 1.8.2 and 1.8.3 to fix upstream #6751, assumed to already be there for the next fix - incorporate candidate patch to fix various issues from MITKRB5-SA-2010-007 (CVE-2010-1323, CVE-2010-1324, CVE-2010-4020, #651962) [1.8.2-3.2] - fix reading of keyUsage extensions when attempting to select pkinit client certs (part of #644825, RT#6775) - fix selection of pkinit client certs when one or more don't include a subjectAltName extension (part of #644825, RT#6774) [1.8.2-3.1] - incorporate candidate patch to fix uninitialized pointer crash in the KDC (CVE-2010-1322, #636336) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0200 CVE-2010-4020 CVE-2010-4022 CVE-2010-1322 CVE-2010-1323 CVE-2010-1324 CVE-2011-0281 CVE-2011-0282 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28012 | |||
Oval ID: | oval:org.mitre.oval:def:28012 | ||
Title: | DEPRECATED: ELSA-2010-0343 -- krb5 security and bug fix update (important) | ||
Description: | [1.6.1-36.el5_5.3] - add upstream patch to fix a few use-after-free bugs, including one in kadmind (CVE-2010-0629, #578185) [1.6.1-36.el5_5.2] - pull changes to libkrb5 to properly handle and chase off-path referrals back from 1.7 (#574387) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0343 CVE-2010-0629 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28014 | |||
Oval ID: | oval:org.mitre.oval:def:28014 | ||
Title: | DEPRECATED: ELSA-2011-0447 -- krb5 security update (moderate) | ||
Description: | [1.8.2-3.7] - kadmind: add upstream patch to fix free() on an invalid pointer (#696341, MITKRB5-SA-2011-004, CVE-2011-0285) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0447 CVE-2011-0285 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28147 | |||
Oval ID: | oval:org.mitre.oval:def:28147 | ||
Title: | DEPRECATED: ELSA-2011-0356 -- krb5 security update (important) | ||
Description: | [1.8.2-3.6] - add revised upstream patch to fix double-free in KDC while returning typed-data with errors (CVE-2011-0284, #681564) [1.8.2-3.5] - add upstream patches to fix double-free in KDC while returning typed-data with errors (CVE-2011-0284, #681564) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0356 CVE-2011-0284 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28149 | |||
Oval ID: | oval:org.mitre.oval:def:28149 | ||
Title: | DEPRECATED: ELSA-2011-0199 -- krb5 security update (important) | ||
Description: | - add upstream patch to fix hang or crash in the KDC when using the LDAP kdb backend (CVE-2011-0281, CVE-2011-0282, #671096) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0199 CVE-2011-0281 CVE-2011-0282 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | krb5 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7198 | |||
Oval ID: | oval:org.mitre.oval:def:7198 | ||
Title: | VMware ESX,Service Console update for krb5. | ||
Description: | The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1321 | Version: | 5 |
Platform(s): | VMWare ESX Server 3.5 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7357 | |||
Oval ID: | oval:org.mitre.oval:def:7357 | ||
Title: | MIT Kerberos AES and RC4 Decryption Integer Underflow Vulnerabilities | ||
Description: | Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4212 | Version: | 5 |
Platform(s): | VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7450 | |||
Oval ID: | oval:org.mitre.oval:def:7450 | ||
Title: | HP-UX Running Kerberos, Remote Denial of Service (DoS), Execution of Arbitrary Code | ||
Description: | The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1321 | Version: | 11 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:8192 | |||
Oval ID: | oval:org.mitre.oval:def:8192 | ||
Title: | Integer Overflow Security Vulnerability in AES and RC4 Decryption in the Solaris Kerberos Crypto Library May Lead to Execution of Arbitrary Code or a Denial of Service (DoS) | ||
Description: | Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4212 | Version: | 2 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9489 | |||
Oval ID: | oval:org.mitre.oval:def:9489 | ||
Title: | Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number. | ||
Description: | Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0629 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-08-14 | Name : Fedora Update for krb5 FEDORA-2012-11370 File : nvt/gb_fedora_2012_11370_krb5_fc16.nasl |
2012-07-30 | Name : CentOS Update for krb5-devel CESA-2011:0199 centos5 x86_64 File : nvt/gb_CESA-2011_0199_krb5-devel_centos5_x86_64.nasl |
2012-07-30 | Name : CentOS Update for krb5-devel CESA-2011:1790 centos6 File : nvt/gb_CESA-2011_1790_krb5-devel_centos6.nasl |
2012-07-09 | Name : RedHat Update for krb5 RHSA-2011:1379-01 File : nvt/gb_RHSA-2011_1379-01_krb5.nasl |
2012-07-09 | Name : RedHat Update for krb5 RHSA-2011:1790-01 File : nvt/gb_RHSA-2011_1790-01_krb5.nasl |
2012-06-15 | Name : Fedora Update for krb5 FEDORA-2012-8803 File : nvt/gb_fedora_2012_8803_krb5_fc16.nasl |
2012-06-15 | Name : Fedora Update for krb5 FEDORA-2012-8805 File : nvt/gb_fedora_2012_8805_krb5_fc15.nasl |
2012-06-06 | Name : RedHat Update for krb5 RHSA-2011:0356-01 File : nvt/gb_RHSA-2011_0356-01_krb5.nasl |
2012-06-06 | Name : RedHat Update for krb5 RHSA-2011:0447-01 File : nvt/gb_RHSA-2011_0447-01_krb5.nasl |
2012-06-05 | Name : RedHat Update for krb5 RHSA-2011:0200-01 File : nvt/gb_RHSA-2011_0200-01_krb5.nasl |
2012-04-16 | Name : VMSA-2010-0009: ESXi utilities and ESX Service Console third party updates File : nvt/gb_VMSA-2010-0009.nasl |
2012-04-02 | Name : Fedora Update for krb5 FEDORA-2011-16296 File : nvt/gb_fedora_2011_16296_krb5_fc16.nasl |
2012-03-16 | Name : VMSA-2011-0003.2 Third party component updates for VMware vCenter Server, vCe... File : nvt/gb_VMSA-2011-0003.nasl |
2012-03-16 | Name : VMSA-2011-0012.3 VMware ESXi and ESX updates to third party libraries and ESX... File : nvt/gb_VMSA-2011-0012.nasl |
2012-03-16 | Name : Ubuntu Update for krb5 USN-1290-1 File : nvt/gb_ubuntu_USN_1290_1.nasl |
2012-03-15 | Name : VMSA-2010-0016 VMware ESXi and ESX third party updates for Service Console an... File : nvt/gb_VMSA-2010-0016.nasl |
2012-03-15 | Name : VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates ... File : nvt/gb_VMSA-2011-0007.nasl |
2012-03-15 | Name : VMSA-2011-0013.2 VMware third party component updates for VMware vCenter Serv... File : nvt/gb_VMSA-2011-0013.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201201-13 (mit-krb5) File : nvt/glsa_201201_13.nasl |
2012-02-11 | Name : Debian Security Advisory DSA 2379-1 (krb5) File : nvt/deb_2379_1.nasl |
2012-02-01 | Name : Fedora Update for krb5 FEDORA-2011-16284 File : nvt/gb_fedora_2011_16284_krb5_fc15.nasl |
2011-11-18 | Name : Fedora Update for krb5 FEDORA-2011-14650 File : nvt/gb_fedora_2011_14650_krb5_fc14.nasl |
2011-11-18 | Name : Fedora Update for krb5 FEDORA-2011-14673 File : nvt/gb_fedora_2011_14673_krb5_fc15.nasl |
2011-10-31 | Name : Mandriva Update for krb5 MDVSA-2011:160 (krb5) File : nvt/gb_mandriva_MDVSA_2011_160.nasl |
2011-10-21 | Name : Ubuntu Update for krb5 USN-1233-1 File : nvt/gb_ubuntu_USN_1233_1.nasl |
2011-08-26 | Name : Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001) File : nvt/secpod_macosx_su11-001.nasl |
2011-08-09 | Name : CentOS Update for krb5-devel CESA-2010:0029 centos5 i386 File : nvt/gb_CESA-2010_0029_krb5-devel_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for krb5-devel CESA-2010:0343 centos5 i386 File : nvt/gb_CESA-2010_0343_krb5-devel_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for krb5-devel CESA-2010:0926 centos5 i386 File : nvt/gb_CESA-2010_0926_krb5-devel_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for krb5-devel CESA-2011:0199 centos5 i386 File : nvt/gb_CESA-2011_0199_krb5-devel_centos5_i386.nasl |
2011-05-12 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb510.nasl |
2011-05-12 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb511.nasl |
2011-05-12 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb512.nasl |
2011-05-12 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb513.nasl |
2011-05-10 | Name : Ubuntu Update for krb5 USN-1116-1 File : nvt/gb_ubuntu_USN_1116_1.nasl |
2011-05-05 | Name : Fedora Update for krb5 FEDORA-2011-5343 File : nvt/gb_fedora_2011_5343_krb5_fc13.nasl |
2011-05-05 | Name : Fedora Update for krb5 FEDORA-2011-5345 File : nvt/gb_fedora_2011_5345_krb5_fc14.nasl |
2011-04-29 | Name : Mandriva Update for krb5 MDVSA-2011:077 (krb5) File : nvt/gb_mandriva_MDVSA_2011_077.nasl |
2011-03-25 | Name : Fedora Update for krb5 FEDORA-2011-3462 File : nvt/gb_fedora_2011_3462_krb5_fc14.nasl |
2011-03-25 | Name : Fedora Update for krb5 FEDORA-2011-3464 File : nvt/gb_fedora_2011_3464_krb5_fc13.nasl |
2011-03-24 | Name : Ubuntu Update for krb5 vulnerability USN-1088-1 File : nvt/gb_ubuntu_USN_1088_1.nasl |
2011-02-18 | Name : Fedora Update for krb5 FEDORA-2011-1210 File : nvt/gb_fedora_2011_1210_krb5_fc13.nasl |
2011-02-18 | Name : Fedora Update for krb5 FEDORA-2011-1225 File : nvt/gb_fedora_2011_1225_krb5_fc14.nasl |
2011-02-16 | Name : Ubuntu Update for krb5 vulnerabilities USN-1062-1 File : nvt/gb_ubuntu_USN_1062_1.nasl |
2011-02-11 | Name : RedHat Update for krb5 RHSA-2011:0199-01 File : nvt/gb_RHSA-2011_0199-01_krb5.nasl |
2011-02-11 | Name : Mandriva Update for krb5 MDVSA-2011:024 (krb5) File : nvt/gb_mandriva_MDVSA_2011_024.nasl |
2011-02-11 | Name : Mandriva Update for krb5 MDVSA-2011:025 (krb5) File : nvt/gb_mandriva_MDVSA_2011_025.nasl |
2011-01-24 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb55.nasl |
2011-01-24 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb56.nasl |
2011-01-24 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb57.nasl |
2011-01-24 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb58.nasl |
2011-01-24 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb59.nasl |
2011-01-21 | Name : HP-UX Update for Kerberos HPSBUX02623 File : nvt/gb_hp_ux_HPSBUX02623.nasl |
2010-12-23 | Name : Fedora Update for krb5 FEDORA-2010-18409 File : nvt/gb_fedora_2010_18409_krb5_fc14.nasl |
2010-12-23 | Name : Fedora Update for krb5 FEDORA-2010-18425 File : nvt/gb_fedora_2010_18425_krb5_fc13.nasl |
2010-12-23 | Name : Ubuntu Update for krb5 vulnerabilities USN-1030-1 File : nvt/gb_ubuntu_USN_1030_1.nasl |
2010-12-09 | Name : CentOS Update for krb5-devel CESA-2010:0926 centos4 i386 File : nvt/gb_CESA-2010_0926_krb5-devel_centos4_i386.nasl |
2010-12-09 | Name : RedHat Update for krb5 RHSA-2010:0926-01 File : nvt/gb_RHSA-2010_0926-01_krb5.nasl |
2010-12-09 | Name : Mandriva Update for krb5 MDVSA-2010:245 (krb5) File : nvt/gb_mandriva_MDVSA_2010_245.nasl |
2010-12-09 | Name : Mandriva Update for krb5 MDVSA-2010:246 (krb5) File : nvt/gb_mandriva_MDVSA_2010_246.nasl |
2010-12-02 | Name : Fedora Update for krb5 FEDORA-2010-15803 File : nvt/gb_fedora_2010_15803_krb5_fc14.nasl |
2010-11-16 | Name : Mandriva Update for krb5 MDVSA-2010:202-1 (krb5) File : nvt/gb_mandriva_MDVSA_2010_202_1.nasl |
2010-10-19 | Name : Mandriva Update for krb5 MDVSA-2010:202 (krb5) File : nvt/gb_mandriva_MDVSA_2010_202.nasl |
2010-10-19 | Name : Ubuntu Update for krb5 vulnerability USN-999-1 File : nvt/gb_ubuntu_USN_999_1.nasl |
2010-07-23 | Name : Ubuntu Update for krb5 vulnerability USN-940-2 File : nvt/gb_ubuntu_USN_940_2.nasl |
2010-07-12 | Name : Mandriva Update for heimdal MDVSA-2010:130 (heimdal) File : nvt/gb_mandriva_MDVSA_2010_130.nasl |
2010-06-03 | Name : Debian Security Advisory DSA 2052-1 (krb5) File : nvt/deb_2052_1.nasl |
2010-05-28 | Name : CentOS Update for krb5-devel CESA-2010:0423 centos3 i386 File : nvt/gb_CESA-2010_0423_krb5-devel_centos3_i386.nasl |
2010-05-28 | Name : CentOS Update for krb5-devel CESA-2010:0423 centos4 i386 File : nvt/gb_CESA-2010_0423_krb5-devel_centos4_i386.nasl |
2010-05-28 | Name : RedHat Update for krb5 RHSA-2010:0423-01 File : nvt/gb_RHSA-2010_0423-01_krb5.nasl |
2010-05-28 | Name : Fedora Update for krb5 FEDORA-2010-8796 File : nvt/gb_fedora_2010_8796_krb5_fc11.nasl |
2010-05-28 | Name : Fedora Update for krb5 FEDORA-2010-8805 File : nvt/gb_fedora_2010_8805_krb5_fc12.nasl |
2010-05-28 | Name : Mandriva Update for krb5 MDVSA-2010:100 (krb5) File : nvt/gb_mandriva_MDVSA_2010_100.nasl |
2010-05-28 | Name : Ubuntu Update for krb5 vulnerabilities USN-940-1 File : nvt/gb_ubuntu_USN_940_1.nasl |
2010-05-04 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb54.nasl |
2010-04-30 | Name : Mandriva Update for netcdf MDVA-2010:129 (netcdf) File : nvt/gb_mandriva_MDVA_2010_129.nasl |
2010-04-30 | Name : Mandriva Update for rpm MDVA-2010:130 (rpm) File : nvt/gb_mandriva_MDVA_2010_130.nasl |
2010-04-29 | Name : Fedora Update for krb5 FEDORA-2010-7130 File : nvt/gb_fedora_2010_7130_krb5_fc12.nasl |
2010-04-21 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb52.nasl |
2010-04-21 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb53.nasl |
2010-04-16 | Name : Mandriva Update for krb5 MDVSA-2010:071 (krb5) File : nvt/gb_mandriva_MDVSA_2010_071.nasl |
2010-04-09 | Name : RedHat Update for krb5 RHSA-2010:0343-01 File : nvt/gb_RHSA-2010_0343-01_krb5.nasl |
2010-04-09 | Name : Fedora Update for krb5 FEDORA-2010-6108 File : nvt/gb_fedora_2010_6108_krb5_fc11.nasl |
2010-04-09 | Name : Ubuntu Update for krb5 vulnerabilities USN-924-1 File : nvt/gb_ubuntu_USN_924_1.nasl |
2010-03-31 | Name : Fedora Update for krb5 FEDORA-2010-4677 File : nvt/gb_fedora_2010_4677_krb5_fc12.nasl |
2010-03-31 | Name : Ubuntu Update for krb5 vulnerabilities USN-916-1 File : nvt/gb_ubuntu_USN_916_1.nasl |
2010-03-22 | Name : Mandriva Update for rootcerts MDVA-2010:100 (rootcerts) File : nvt/gb_mandriva_MDVA_2010_100.nasl |
2010-03-02 | Name : Fedora Update for krb5 FEDORA-2010-0503 File : nvt/gb_fedora_2010_0503_krb5_fc12.nasl |
2010-03-02 | Name : Fedora Update for krb5 FEDORA-2010-0515 File : nvt/gb_fedora_2010_0515_krb5_fc11.nasl |
2010-03-02 | Name : Fedora Update for krb5 FEDORA-2010-1722 File : nvt/gb_fedora_2010_1722_krb5_fc12.nasl |
2010-02-19 | Name : Mandriva Update for eject MDVA-2010:071 (eject) File : nvt/gb_mandriva_MDVA_2010_071.nasl |
2010-01-25 | Name : SuSE Update for krb5 SUSE-SA:2010:006 File : nvt/gb_suse_2010_006.nasl |
2010-01-22 | Name : Kerberos5 KDC Cross Realm Referral Denial of Service Vulnerability File : nvt/gb_kerberos5_kdc_dos_vuln.nasl |
2010-01-20 | Name : Kerberos5 Multiple Integer Underflow Vulnerabilities File : nvt/gb_kerberos5_mult_int_underflow_vuln.nasl |
2010-01-19 | Name : CentOS Update for krb5-devel CESA-2010:0029 centos3 i386 File : nvt/gb_CESA-2010_0029_krb5-devel_centos3_i386.nasl |
2010-01-19 | Name : CentOS Update for krb5-devel CESA-2010:0029 centos3 x86_64 File : nvt/gb_CESA-2010_0029_krb5-devel_centos3_x86_64.nasl |
2010-01-19 | Name : CentOS Update for krb5-devel CESA-2010:0029 centos4 i386 File : nvt/gb_CESA-2010_0029_krb5-devel_centos4_i386.nasl |
2010-01-19 | Name : CentOS Update for krb5-devel CESA-2010:0029 centos4 x86_64 File : nvt/gb_CESA-2010_0029_krb5-devel_centos4_x86_64.nasl |
2010-01-19 | Name : RedHat Update for krb5 RHSA-2010:0029-01 File : nvt/gb_RHSA-2010_0029-01_krb5.nasl |
2010-01-19 | Name : Mandriva Update for krb5 MDVSA-2010:006 (krb5) File : nvt/gb_mandriva_MDVSA_2010_006.nasl |
2010-01-19 | Name : Ubuntu Update for krb5 vulnerability USN-881-1 File : nvt/gb_ubuntu_USN_881_1.nasl |
2010-01-15 | Name : Fedora Update for krb5 FEDORA-2009-13539 File : nvt/gb_fedora_2009_13539_krb5_fc12.nasl |
2010-01-15 | Name : Ubuntu Update for krb5 vulnerability USN-879-1 File : nvt/gb_ubuntu_USN_879_1.nasl |
0000-00-00 | Name : FreeBSD Ports: krb5 File : nvt/freebsd_krb514.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
77572 | MIT Kerberos 5 (krb5) src/kdc/do_tgs_req.c process_tgs_req() Function TGS Req... |
76661 | Kerberos KDC lookup_lockout_policy() Function NULL Pointer Dereference Remote... |
76660 | Kerberos KDC krb5_ldap_get_principal() Function NULL Pointer Dereference Remo... |
76659 | Kerberos KDC Multiple Function Assertation Weakness Remote DoS |
71972 | Oracle Solaris Kerberos Checksum Acceptability Weakness KDC / KRB-SAFE Messag... Oracle Solaris contains a flaw in the Kerberos component related to the acceptability of checksums. This may allow a remote attacker to modify user-visible prompt text, modify a reponse to a KDC, or forge a KRB-SAFE message via unkeyed checksums or the use of RC4 keys. |
71789 | Kerberos kadmind Unspecified Packet Handling Remote DoS |
71183 | Kerberos KDC src/kdc/do_as_req.c prepare_error_as() Function AS-REQ Request D... Kerberos contains a flaw related to the Key Distribution Center daemon within the 'prepare_error_as()' function in 'src/kdc/do_as_req.c' failing to properly handle AS-REQ requests. This may allow a remote attacker to use crafted AS-REQ requests to cause a double-free condition, which may allow the attacker to execute arbitrary code. |
70910 | Kerberos KDC Unspecified DoS Kerberos contains a flaw that may allow a remote denial of service. The issue is triggered when a NULL pointer dereference occurs in the Key Distribution Center, allowing a remote attacker to use a crafted packet to cause a denial of service. |
70909 | Kerberos KDC LDAP Backend Principal Name Handling DoS Kerberos contains a flaw that may allow a remote denial of service. The issue is triggered when the Key Distribution Center improperly processes certain principal names which causes a NULL pointer dereference error, when an LDAP backend is used, allowing a remote attacker to cause a denial of service via a crafted request. |
70908 | Kerberos KDC LDAP Backend Unparse Implementation DoS Kerberos contains a flaw that may allow a remote denial of service. The issue is triggered when the unparse implementation in the Key Distribution Center improperly processes certain principal names which trigger backslash escape sequences, when an LDAP backend is used, allowing a remote attacker to cause a denial of service via a crafted request. |
70907 | Kerberos kpropd do_standalone() Function Unspecified DoS Kerberos contains a flaw that may allow a remote denial of service. The issue is triggered when the 'do_standalone' function in the KDC database propagation daemon fails to properly handle a worker child process exiting abnormally, allowing a remote attacker to cause a denial of service. |
70083 | Oracle Database MIT Kerberos 5 kg_accept_krb5 Remote Denial of Service Oracle Database contains a flaw that may allow a remote denial of service. The issue is triggered when 'kg_accept_krb5' function in 'krb5/accept_sec_context.c', the GSS-API library in MIT Kerberos 5 fails to properly check for invalid GSS-API tokens, allowing a remote authenticated attacker to use a crafted AP-REQ message with a missing checksum field to cause a denial of service. |
69610 | MIT Kerberos 5 (krb5) Checksum Acceptability Weakness KDC / KRB-SAFE Message ... MIT Kerberos 5 (krb5) contains a flaw related to the acceptability of checksums. This may allow a remote attacker to modify user-visible prompt text, modify a reponse to a KDC, or forge a KRB-SAFE message via unkeyed checksums or the use of RC4 keys. |
69609 | MIT Kerberos 5 (krb5) Checksum Acceptability Weakness RC4 Key GSS Token Forge... [MIT Kerberos 5 (krb5)contains a flaw related to the acceptability of checksums. This may allow a remote attacker to forge GSS tokens via an unkeyed checksum, gain privileges via an unkeyed PAC checksum (the attacker must be authenticated in this case), or have other unspecified impact via a KrbFastArmoredReq checksum based on an RC4 key. |
69608 | MIT Kerberos 5 (krb5) RC4 Key-derivation Checksums One-byte Stream-cipher Ope... MIT Kerberos 5 (krb5) does not properly reject RC4 key-derivation checksums. The issue is triggered when a remote, authenticated attacker forges an 'AD-SIGNEDPATH' or 'AD-KDC-ISSUED' signature through vulnerabilities in certain certain one-byte stream-cipher operations. This may allow an attacker to gain elevated privileges. |
69607 | MIT Kerberos 5 (krb5) KDC TGS Request TGT Credentials Inner Request KrbFastRe... MIT Kerberos 5 (krb5) contains a flaw related to the Key Distrubiton Center (KDC). The KDC does not properly restrict the use of TGT credentials for armoring TGS requests. The issue is triggered when a remote, authenticated attacker rewrites an inner request (or 'KrbFastReq Forgery Issue']. This may allow the attacker to impersonate a client. |
68525 | MIT Kerberos 5 (krb5) Key Distribution Center kdc_authdata.c merge_authdata F... MIT Kerberos 5 contains a flaw that may allow a remote denial of service. The issue is triggered when the 'merge_authdata()' function in 'kdc_authdata.c' in the Key Distribution Center suffers from an array-indexing error when processing authorization data, allowing a remote attacker to cause a denial of service. It is also possible, though not confirmed, for an attacker to in certain rare theoretical circumstances execute arbitrary code, spoof authorization, or obtain access to potentially sensitive information. |
64744 | Kerberos GSS-API AP-REQ Authenticator NULL Dereference Remote DoS |
63975 | Kerberos KDC kdc/do_tgs_req.c process_tgs_req() Function Ticket Validation Do... |
63569 | Kerberos src/kadmin/server/server_stubs.c init_2_svc() Function API Version N... |
62391 | Kerberos KDC Authorization Data Request Remote DoS |
61795 | MIT Kerberos 5 (krb5) Crypto Library AES / RC4 Decryption Functionality Malfo... |
61423 | Kerberos KDC Cross-Realm Referral kdc/do_tgs_req.c prep_reprocess_req Functio... Kerberos contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious attacker sends a specially crafted packet which triggers a NULL pointer dereference in the prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC), and will result in loss of availability for the service. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-07-16 | IAVM : 2015-A-0160 - Multiple Vulnerabilities in Oracle Linux and Virtualization Severity : Category I - VMSKEY : V0061123 |
2011-12-01 | IAVM : 2011-A-0160 - Multiple Vulnerabilities in VMware vCenter Server 4.0 and vCenter Update Mana... Severity : Category I - VMSKEY : V0030769 |
2011-10-27 | IAVM : 2011-A-0147 - Multiple Vulnerabilities in VMware ESX and ESXi Severity : Category I - VMSKEY : V0030545 |
2011-05-12 | IAVM : 2011-A-0066 - Multiple Vulnerabilities in VMware Products Severity : Category I - VMSKEY : V0027158 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-11-16 | MIT Kerberos KDC TGS request cross-realm referral null pointer dereference de... RuleID : 31765 - Revision : 4 - Type : SERVER-OTHER |
2014-11-16 | MIT Kerberos KDC TGS request cross-realm referral null pointer dereference de... RuleID : 31764 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | Kerberos KDC null pointer dereference denial of service attempt RuleID : 27195 - Revision : 5 - Type : SERVER-OTHER |
2014-01-10 | Kerberos KDC null pointer dereference denial of service attempt RuleID : 27194 - Revision : 5 - Type : SERVER-OTHER |
2014-01-10 | Kerberos KDC null pointer dereference denial of service attempt RuleID : 27193 - Revision : 5 - Type : SERVER-OTHER |
2014-01-10 | MIT Kerberos kpasswd process_chpw_request denial of service attempt RuleID : 26769 - Revision : 8 - Type : SERVER-OTHER |
2014-01-10 | MIT Kerberos libkdb_ldap principal name handling denial of service attempt RuleID : 26759 - Revision : 6 - Type : SERVER-OTHER |
2014-01-10 | MIT Kerberos kdb_ldap plugin kinit operation denial of service attempt RuleID : 26575 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | Kerberos KDC null pointer dereference denial of service attempt RuleID : 24372 - Revision : 6 - Type : SERVER-OTHER |
2014-01-10 | MIT Kerberos KDC Ticket validation double free memory corruption attempt RuleID : 18901 - Revision : 9 - Type : SERVER-OTHER |
2014-01-10 | MIT Kerberos KDC authentication denial of service attempt RuleID : 18534 - Revision : 9 - Type : SERVER-OTHER |
2014-01-10 | MIT Kerberos KDC authentication denial of service attempt RuleID : 18533 - Revision : 9 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-08 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2010-0009_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-08 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2010-0013_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2011-0003_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2011-0007_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2011-0012_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2011-0013_remote.nasl - Type : ACT_GATHER_INFO |
2015-07-16 | Name : The application installed on the remote host is affected by multiple vulnerab... File : oracle_secure_global_desktop_jul_2015_cpu.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_kerberos_20130702.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_kerberos_20130924_2.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2011-0015.nasl - Type : ACT_GATHER_INFO |
2014-11-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1850.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2011-58.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_java-1_6_0-sun-101019.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_krb5-101006.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_krb5-101201.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_krb5-110209.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_krb5-110316.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_krb5-110414.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_krb5-111019.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_krb5-110316.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_krb5-110414.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_krb5-111019.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-15.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2011-28.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0029.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0343.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0423.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0926.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0199.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0200.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0356.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0447.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1379.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1790.nasl - Type : ACT_GATHER_INFO |
2013-03-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-879-1.nasl - Type : ACT_GATHER_INFO |
2013-03-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-916-1.nasl - Type : ACT_GATHER_INFO |
2013-03-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-924-1.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Unix host contains a programming platform that is affected by mult... File : oracle_java_cpu_oct_2010_unix.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0880.nasl - Type : ACT_GATHER_INFO |
2012-09-06 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-159.nasl - Type : ACT_GATHER_INFO |
2012-09-06 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-184.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100112_krb5_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100406_krb5_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100518_krb5_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101014_java__jdk_1_6_0__on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101110_krb5_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101130_krb5_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110208_krb5_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110414_krb5_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111018_krb5_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111206_krb5_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-02-01 | Name : The remote Fedora host is missing a security update. File : fedora_2011-16284.nasl - Type : ACT_GATHER_INFO |
2012-01-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201201-13.nasl - Type : ACT_GATHER_INFO |
2012-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2379.nasl - Type : ACT_GATHER_INFO |
2011-12-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1790.nasl - Type : ACT_GATHER_INFO |
2011-12-14 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_6c7d9a35260811e189b4001ec9578670.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote Fedora host is missing a security update. File : fedora_2011-16296.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_4_2-ibm-7440.nasl - Type : ACT_GATHER_INFO |
2011-12-08 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1290-1.nasl - Type : ACT_GATHER_INFO |
2011-12-07 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1790.nasl - Type : ACT_GATHER_INFO |
2011-11-16 | Name : The remote Fedora host is missing a security update. File : fedora_2011-14650.nasl - Type : ACT_GATHER_INFO |
2011-11-16 | Name : The remote Fedora host is missing a security update. File : fedora_2011-14673.nasl - Type : ACT_GATHER_INFO |
2011-10-28 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2011-0013.nasl - Type : ACT_GATHER_INFO |
2011-10-24 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-160.nasl - Type : ACT_GATHER_INFO |
2011-10-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1379.nasl - Type : ACT_GATHER_INFO |
2011-10-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1233-1.nasl - Type : ACT_GATHER_INFO |
2011-10-14 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2011-0012.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1116-1.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_krb5-101201.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_krb5-101201.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_krb5-110209.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_krb5-110316.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_krb5-110414.nasl - Type : ACT_GATHER_INFO |
2011-04-29 | Name : The remote VMware ESXi / ESX host is missing a security-related patch. File : vmware_VMSA-2011-0007.nasl - Type : ACT_GATHER_INFO |
2011-04-26 | Name : The remote Fedora host is missing a security update. File : fedora_2011-5343.nasl - Type : ACT_GATHER_INFO |
2011-04-26 | Name : The remote Fedora host is missing a security update. File : fedora_2011-5345.nasl - Type : ACT_GATHER_INFO |
2011-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-077.nasl - Type : ACT_GATHER_INFO |
2011-04-18 | Name : The remote Fedora host is missing a security update. File : fedora_2011-5333.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-0199.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_4ab413ea66ce11e0bf05d445f3aa24f0.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_64f24a1e66cf11e09debf345f3aa24f0.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_6a3c3e5c66cb11e0a116c535f3aa24f0.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_7edac52a66cd11e093985d45f3aa24f0.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0447.nasl - Type : ACT_GATHER_INFO |
2011-03-25 | Name : The remote Fedora host is missing a security update. File : fedora_2011-3462.nasl - Type : ACT_GATHER_INFO |
2011-03-25 | Name : The remote Fedora host is missing a security update. File : fedora_2011-3464.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2011-3547.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_6_7.nasl - Type : ACT_GATHER_INFO |
2011-03-22 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-001.nasl - Type : ACT_GATHER_INFO |
2011-03-21 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-048.nasl - Type : ACT_GATHER_INFO |
2011-03-17 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0356.nasl - Type : ACT_GATHER_INFO |
2011-03-16 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1088-1.nasl - Type : ACT_GATHER_INFO |
2011-03-11 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12682.nasl - Type : ACT_GATHER_INFO |
2011-03-11 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_4_2-ibm-110223.nasl - Type : ACT_GATHER_INFO |
2011-03-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_4_2-ibm-7348.nasl - Type : ACT_GATHER_INFO |
2011-02-18 | Name : The remote Fedora host is missing a security update. File : fedora_2011-1210.nasl - Type : ACT_GATHER_INFO |
2011-02-18 | Name : The remote Fedora host is missing a security update. File : fedora_2011-1225.nasl - Type : ACT_GATHER_INFO |
2011-02-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1062-1.nasl - Type : ACT_GATHER_INFO |
2011-02-14 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2011-0003.nasl - Type : ACT_GATHER_INFO |
2011-02-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-024.nasl - Type : ACT_GATHER_INFO |
2011-02-10 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-025.nasl - Type : ACT_GATHER_INFO |
2011-02-10 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_krb5-110120.nasl - Type : ACT_GATHER_INFO |
2011-02-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0199.nasl - Type : ACT_GATHER_INFO |
2011-02-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0200.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_6_0-sun-7204.nasl - Type : ACT_GATHER_INFO |
2011-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-ibm-101220.nasl - Type : ACT_GATHER_INFO |
2011-01-24 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_41775.nasl - Type : ACT_GATHER_INFO |
2011-01-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12669.nasl - Type : ACT_GATHER_INFO |
2011-01-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0152.nasl - Type : ACT_GATHER_INFO |
2010-12-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0987.nasl - Type : ACT_GATHER_INFO |
2010-12-10 | Name : The remote Fedora host is missing a security update. File : fedora_2010-18425.nasl - Type : ACT_GATHER_INFO |
2010-12-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_0d57c1d903f411e0bf50001a926c7637.nasl - Type : ACT_GATHER_INFO |
2010-12-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_11bbccbc03ee11e0bcdb001fc61c2a55.nasl - Type : ACT_GATHER_INFO |
2010-12-10 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_1d193bba03f611e0bf50001a926c7637.nasl - Type : ACT_GATHER_INFO |
2010-12-10 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4ccbd40d03f711e0bf50001a926c7637.nasl - Type : ACT_GATHER_INFO |
2010-12-10 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_9f971cea03f511e0bf50001a926c7637.nasl - Type : ACT_GATHER_INFO |
2010-12-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1030-1.nasl - Type : ACT_GATHER_INFO |
2010-12-09 | Name : The remote Fedora host is missing a security update. File : fedora_2010-18409.nasl - Type : ACT_GATHER_INFO |
2010-12-03 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_krb5-101117.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0926.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2129.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0935.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_java-1_6_0-sun-101019.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_krb5-100401.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_krb5-100520.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_java-1_5_0-ibm-7205.nasl - Type : ACT_GATHER_INFO |
2010-12-01 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-245.nasl - Type : ACT_GATHER_INFO |
2010-12-01 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-246.nasl - Type : ACT_GATHER_INFO |
2010-12-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0925.nasl - Type : ACT_GATHER_INFO |
2010-12-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0926.nasl - Type : ACT_GATHER_INFO |
2010-12-01 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12659.nasl - Type : ACT_GATHER_INFO |
2010-11-18 | Name : The remote database server is affected by multiple vulnerabilities. File : oracle_rdbms_cpu_oct_2010.nasl - Type : ACT_GATHER_INFO |
2010-11-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0863.nasl - Type : ACT_GATHER_INFO |
2010-11-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0873.nasl - Type : ACT_GATHER_INFO |
2010-11-16 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2010-0016.nasl - Type : ACT_GATHER_INFO |
2010-10-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0807.nasl - Type : ACT_GATHER_INFO |
2010-10-22 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_java-1_6_0-sun-101019.nasl - Type : ACT_GATHER_INFO |
2010-10-22 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_java-1_6_0-sun-101019.nasl - Type : ACT_GATHER_INFO |
2010-10-20 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_10_5_update8.nasl - Type : ACT_GATHER_INFO |
2010-10-20 | Name : The remote host has a version of Java that is affected by multiple vulnerabil... File : macosx_java_10_6_update3.nasl - Type : ACT_GATHER_INFO |
2010-10-15 | Name : The remote Fedora host is missing a security update. File : fedora_2010-15803.nasl - Type : ACT_GATHER_INFO |
2010-10-15 | Name : The remote Windows host contains a programming platform that is affected by m... File : oracle_java_cpu_oct_2010.nasl - Type : ACT_GATHER_INFO |
2010-10-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0770.nasl - Type : ACT_GATHER_INFO |
2010-10-14 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-202.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_krb5-6776.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_krb5-7046.nasl - Type : ACT_GATHER_INFO |
2010-10-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-999-1.nasl - Type : ACT_GATHER_INFO |
2010-09-02 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2010-0013.nasl - Type : ACT_GATHER_INFO |
2010-07-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-940-2.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-0503.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-0515.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-1722.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-6108.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-7102.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-7130.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-8749.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-8796.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-8805.nasl - Type : ACT_GATHER_INFO |
2010-06-28 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_41166.nasl - Type : ACT_GATHER_INFO |
2010-06-28 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_41167.nasl - Type : ACT_GATHER_INFO |
2010-06-28 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_41168.nasl - Type : ACT_GATHER_INFO |
2010-06-15 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_4.nasl - Type : ACT_GATHER_INFO |
2010-06-15 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd2010-004.nasl - Type : ACT_GATHER_INFO |
2010-06-01 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0343.nasl - Type : ACT_GATHER_INFO |
2010-06-01 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2010-0009.nasl - Type : ACT_GATHER_INFO |
2010-05-26 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2052.nasl - Type : ACT_GATHER_INFO |
2010-05-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_krb5-100521.nasl - Type : ACT_GATHER_INFO |
2010-05-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_krb5-100521.nasl - Type : ACT_GATHER_INFO |
2010-05-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_krb5-100521.nasl - Type : ACT_GATHER_INFO |
2010-05-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0423.nasl - Type : ACT_GATHER_INFO |
2010-05-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-100.nasl - Type : ACT_GATHER_INFO |
2010-05-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-940-1.nasl - Type : ACT_GATHER_INFO |
2010-05-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0423.nasl - Type : ACT_GATHER_INFO |
2010-05-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0343.nasl - Type : ACT_GATHER_INFO |
2010-04-23 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_krb5-100421.nasl - Type : ACT_GATHER_INFO |
2010-04-22 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_86b8b6554d1a11df83fb0015587e2cc1.nasl - Type : ACT_GATHER_INFO |
2010-04-20 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_9ac0f9c4492b11df83fb0015587e2cc1.nasl - Type : ACT_GATHER_INFO |
2010-04-20 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_a30573dc489311dfa5f9001641aeabdf.nasl - Type : ACT_GATHER_INFO |
2010-04-14 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-071.nasl - Type : ACT_GATHER_INFO |
2010-04-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_krb5-100401.nasl - Type : ACT_GATHER_INFO |
2010-04-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_krb5-100401.nasl - Type : ACT_GATHER_INFO |
2010-04-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2031.nasl - Type : ACT_GATHER_INFO |
2010-02-25 | Name : The remote Fedora host is missing a security update. File : fedora_2009-13539.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1969.nasl - Type : ACT_GATHER_INFO |
2010-02-19 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_krb5-100217.nasl - Type : ACT_GATHER_INFO |
2010-01-20 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_krb5-100113.nasl - Type : ACT_GATHER_INFO |
2010-01-20 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_krb5-100113.nasl - Type : ACT_GATHER_INFO |
2010-01-20 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_krb5-100113.nasl - Type : ACT_GATHER_INFO |
2010-01-20 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_krb5-100113.nasl - Type : ACT_GATHER_INFO |
2010-01-20 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_krb5-6775.nasl - Type : ACT_GATHER_INFO |
2010-01-14 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-006.nasl - Type : ACT_GATHER_INFO |
2010-01-13 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0029.nasl - Type : ACT_GATHER_INFO |
2010-01-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0029.nasl - Type : ACT_GATHER_INFO |
2010-01-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-881-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:37:09 |
|