Berkeley Telnet Kerberos漏洞

漏洞信息详情

Berkeley Telnet Kerberos漏洞

漏洞简介

具有加密术和Kerberos 4身份验证的BSD远程登录客户端存在漏洞。远程攻击者可以通过嗅探解密会话。

漏洞公告

A patch exists and is available via anonymous FTP from ‘net-dist.mit.edu’ in the directory ‘/pub/telnet’.
The patch (which is also included in this message) can be found in the file ‘/pub/telnet/telnet.patch’. The file ‘/pub/telnet/telnet.patch.sig’ contains a detached PGP signature of this file.
Users of NCSA Telnet should upgrade to the NCSA telnet 2.6.1d4, which is available from ‘ftp.ncsa.uiuc.edu’ in the directory ‘/Mac/Telnet/Telnet2.6/prerelease/d4’.
Customers of FTP Software with an encrypting telnet (provided in the PC/TCP or OnNet packages) should call the FTP technical support line at 1-800-282-4387 and ask for the ‘tn encrypt patch’.

参考网址

来源:CERT/CC Advisory: CA-1995-03
名称: CA-1995-03
链接:http://www.cert.org/advisories/CA-1995-03.html

来源: CIAC
名称: F-12
链接:http://www.ciac.org/ciac/bulletins/f-12.shtml

来源: OSVDB
名称: 4881
链接:http://www.osvdb.org/4881

来源: XF
名称: bsd-telnet(516)
链接:http://www.iss.net/security_center/static/516.php

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享