How to Buy
This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200406-21
(mit-krb5: Multiple buffer overflows in krb5_aname_to_localname)
The library function krb5_aname_to_localname() contains multiple buffer
overflows. This is only exploitable if explicit mapping or rules-based
mapping is enabled. These are not enabled as default.
With explicit mapping enabled, an attacker must authenticate using a
principal name listed in the explicit mapping list.
With rules-based mapping enabled, an attacker must first be able to create
arbitrary principal names either in the local realm Kerberos realm or in a
remote realm from which the local realm's service are reachable by
An attacker could use these vulnerabilities to execute arbitrary code with
the permissions of the user running mit-krb5, which could be the root user.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version.
See also :
mit-krb5 users should upgrade to the latest version:
# emerge sync
# emerge -pv '>=app-crypt/mit-krb5-1.3.3-r1'
# emerge '>=app-crypt/mit-krb5-1.3.3-r1'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 14532 (gentoo_GLSA-200406-21.nasl)
CVE ID: CVE-2004-0523
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.