Language:
https://www.redhat.com/security/data/cve/CVE-2011-4862.html
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt
Severity: Critical
ID: 64017
File Name: redhat-RHSA-2011-1853.nasl
Version: 1.12
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 1/24/2013
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: Critical
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:krb5-devel, p-cpe:/a:redhat:enterprise_linux:krb5-libs, p-cpe:/a:redhat:enterprise_linux:krb5-server, p-cpe:/a:redhat:enterprise_linux:krb5-server-ldap, p-cpe:/a:redhat:enterprise_linux:krb5-workstation, cpe:/o:redhat:enterprise_linux:5.3, cpe:/o:redhat:enterprise_linux:5.6
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/28/2011
Core Impact
Metasploit (Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow)
ExploitHub (EH-11-760)
CVE: CVE-2011-4862
RHSA: 2011:1853