---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora Core 5 update for krb5 SECUNIA ADVISORY ID: SA23707 VERIFY ADVISORY: http://secunia.com/advisories/23707/ CRITICAL: Highly critical IMPACT: Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 5 http://secunia.com/product/8808/ DESCRIPTION: Fedora has issued an update for krb5. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges, or by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. For more information: SA21402 SA23696 SOLUTION: Apply updated packages. 7793a2b82312ff8cd74eed932f19fd140fde8dbc SRPMS/krb5-1.4.3-5.3.src.rpm 7793a2b82312ff8cd74eed932f19fd140fde8dbc noarch/krb5-1.4.3-5.3.src.rpm 80872f714bccacb4a0fe819cf056d08b8b6f2acb ppc/debug/krb5-debuginfo-1.4.3-5.3.ppc.rpm be455c361d844ed4ec7ff77babef73bf0f1fc135 ppc/krb5-devel-1.4.3-5.3.ppc.rpm 03c13c6e72b3712c81ae4e7a8204c18c8844827a ppc/krb5-libs-1.4.3-5.3.ppc.rpm f9407fb7e90f1110b0292c16c3396283cf31de00 ppc/krb5-server-1.4.3-5.3.ppc.rpm c8b605fca4374ed90477c56db750e1071e255857 ppc/krb5-workstation-1.4.3-5.3.ppc.rpm fad46a7c60b6eb14fb7be738a8f0aecfe5f43e91 x86_64/krb5-devel-1.4.3-5.3.x86_64.rpm 60fe48a00502de2943e3dd0a638905365fb2fcc5 x86_64/krb5-libs-1.4.3-5.3.x86_64.rpm 8e25791a803d4a33dd86bce562d4280b00afaeb3 x86_64/debug/krb5-debuginfo-1.4.3-5.3.x86_64.rpm 5a7ec7ebdeb2e76becec5d525824c44a6a50c3ba x86_64/krb5-workstation-1.4.3-5.3.x86_64.rpm 2fe1049372d5c4b932995fd11f17f954ea778aa6 x86_64/krb5-server-1.4.3-5.3.x86_64.rpm d284d66778ff2f1f379f82743fcdd8101123c5a6 i386/krb5-server-1.4.3-5.3.i386.rpm ce685e8dc97cefb790da2a9660d12c42d0ba44c2 i386/krb5-libs-1.4.3-5.3.i386.rpm bbf873cfbc83e1a1f3ed5e4058b90fef0ba725e3 i386/krb5-devel-1.4.3-5.3.i386.rpm 83f98440fe6ea3012d4534453b3348914c255709 i386/debug/krb5-debuginfo-1.4.3-5.3.i386.rpm 239fd28094e8e8b95f8cadff7adebcc19cde1f11 i386/krb5-workstation-1.4.3-5.3.i386.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2376 OTHER REFERENCES: SA21402: http://secunia.com/advisories/21402/ SA23696: http://secunia.com/advisories/23696/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------