Mandrake Linux Security Advisory : krb5 (MDKSA-2002:073-1)

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

A stack-based buffer overflow in the implementation of the Kerberos v4
compatibility administration daemon (kadmind4) in the krb5 package can
be exploited to gain unauthorized root access to a KDC host.
Authentication to the daemon is not required to successfully perform
the attack and according to MIT at least one exploit is known to
exist. kadmind4 is used only by sites that require compatibility with
legacy administrative clients, and sites that do not have these needs
are likely not using kadmind4 and are not affected.

MandrakeSoft encourages all users who use Kerberos to upgrade to these
packages immediately.

Update :

The /etc/rc.d/init.d/kadmin initscript improperly pointed to a
non-existent location for the kadmind binary. This update corrects the
problem.

See also :

http://www.nessus.org/u?282e0fc0

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 13973 (mandrake_MDKSA-2002-073.nasl)

Bugtraq ID:

CVE ID: CVE-2002-1235

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now