Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2004:056-1: krb5 Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the krb5 package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2004:056-1 (krb5).
Multiple buffer overflows exist in the krb5_aname_to_localname() library
function that if exploited could lead to unauthorized root rights. In order
to exploit this flaw, a possible hacker must first successfully authenticate to a
vulnerable service, which must be configured to enable the explicit mapping or
rules-based mapping functionality of krb5_aname_to_localname, which is not a
Mandrakesoft encourages all users to upgrade to these patched krb5 packages.
The original patch provided contained a bug where rule-based entries on systems
without HAVE_REGCOMP would not work. These updated packages provide the second
patch provided by Kerberos development team which fixes that behaviour.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:056-1
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.