|
Family: General --> Category: infos
Kerberos IV cryptographic weaknesses Vulnerability Scan
Vulnerability Scan Summary Check for kerberos
Detailed Explanation for this Vulnerability Test
The remote host is running Kerberos IV.
It has been demonstrated that the Kerberos IV protocol has inherent
design flaws that make it insecure to use.
See also : http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt
Solution : Use kerberos 5 instead. If you run Kerberos 5 with kerberos IV backward
compatibility, make sure you upgrade to version 1.3
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|