S-236: krb5 Security Vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-236: krb5 Security Vulnerabilities
# 1  
Old 03-27-2008
S-236: krb5 Security Vulnerabilities

Several remote vulnerabilities have been discovered in the kdc component of the krb5, a system for authenticating users and services on a network. The risk is MEDIUM. An unauthenticated remote attacker may cause a krb4-enabled KDC to crash, expose information, or execute arbitrary code. Successful exploitation of this vulnerability could compromise the Kerberos key database and host security on the KDC host.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
SSSD_KRB5_LOCATOR_PL(8) 					 SSSD Manual pages					   SSSD_KRB5_LOCATOR_PL(8)

NAME
sssd_krb5_locator_plugin - the configuration file for SSSD DESCRIPTION
The Kerberos locator plugin sssd_krb5_locator_plugin is used by the Kerberos provider of sssd(8) to tell the Kerberos libraries what Realm and which KDC to use. Typically this is done in krb5.conf(5) which is always read by the Kerberos libraries. To simplify the configuration the Realm and the KDC can be defined in sssd.conf(5) as described in sssd-krb5.conf(5) sssd(8) puts the Realm and the name or IP address of the KDC into the environment variables SSSD_KRB5_REALM and SSSD_KRB5_KDC respectively. When sssd_krb5_locator_plugin is called by the kerberos libraries it reads and evaluates these variables and returns them to the libraries. NOTES
Not all Kerberos implementations support the use of plugins. If sssd_krb5_locator_plugin is not available on your system you have to edit /etc/krb5.conf to reflect your Kerberos setup. If the environment variable SSSD_KRB5_LOCATOR_DEBUG is set to any value debug messages will be sent to stderr. SEE ALSO
sssd-krb5(5), sssd.conf(5), sssd(8) AUTHORS
The SSSD upstream - http://fedorahosted.org/sssd SSSD
03/04/2013 SSSD_KRB5_LOCATOR_PL(8)