exploit the possibilities

Debian Security Advisory 4589-1

Debian Security Advisory 4589-1
Posted Dec 19, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4589-1 - It was discovered that debian-edu-config, a set of configuration files used for the Debian Edu blend, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other user principals.

tags | advisory
systems | linux, debian
advisories | CVE-2019-3467
MD5 | e4df8ed4769291e763e92613218f5687

Debian Security Advisory 4589-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4589-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : debian-edu-config
CVE ID : CVE-2019-3467
Debian Bug : 946797

It was discovered that debian-edu-config, a set of configuration files
used for the Debian Edu blend, configured too permissive ACLs for the
Kerberos admin server, which allowed password changes for other user
principals.

For the oldstable distribution (stretch), this problem has been fixed
in version 1.929+deb9u4.

For the stable distribution (buster), this problem has been fixed in
version 2.10.65+deb10u3.

We recommend that you upgrade your debian-edu-config packages.

For the detailed security status of debian-edu-config please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/debian-edu-config

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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6lpd
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close