This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200904-09
(MIT Kerberos 5: Multiple vulnerabilities)
Multiple vulnerabilities have been reported in MIT Kerberos 5:
A free() call on an uninitialized pointer in the ASN.1 decoder
when decoding an invalid encoding (CVE-2009-0846).
overread in the SPNEGO GSS-API application, reported by Apple Product
A NULL pointer dereference in the
SPNEGO GSS-API application, reported by Richard Evans
An incorrect length check inside an ASN.1
decoder leading to spurious malloc() failures (CVE-2009-0847).
A remote unauthenticated attacker could exploit the first vulnerability
to cause a Denial of Service or, in unlikely circumstances, execute
arbitrary code on the host running krb5kdc or kadmind with root
privileges and compromise the Kerberos key database. Exploitation of
the other vulnerabilities might lead to a Denial of Service in kadmind,
krb5kdc, or other daemons performing authorization against Kerberos
that utilize GSS-API or an information disclosure.
There is no known workaround at this time.
See also :
All MIT Kerberos 5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-crypt/mit-krb5-1.6.3-r6'
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 36137 (gentoo_GLSA-200904-09.nasl)
Bugtraq ID: 342573440834409
CVE ID: CVE-2009-0844CVE-2009-0845CVE-2009-0846CVE-2009-0847
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.