Hey there! Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. Join 93115 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.
Interests:... The never-ending battle for Truth, Justice, and the American way.
Posted 27 June 2007 - 05:19 AM
FYI...
- http://secunia.com/advisories/25800/
Release Date: 2007-06-27
Critical: Highly critical
Impact: DoS. System access
Where: From remote
Solution Status: Vendor Workaround
Software: Kerberos 5.x
...Successful exploitation allows execution of arbitrary code but requires valid user credentials. The vulnerabilities are reported in krb5-1.6.1. Other versions may also be affected.
Solution: Apply patches (see vendor advisories for details).
.The machine has no brain.
......... Use your own.
Browser check for updateshere.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
Edited by AplusWebMaster, 05 September 2007 - 04:56 AM.
.The machine has no brain.
......... Use your own.
Browser check for updateshere.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
Edited by AplusWebMaster, 19 March 2008 - 06:26 AM.
.The machine has no brain.
......... Use your own.
Browser check for updateshere.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.