This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
Multiple buffer overflows exist in the krb5_aname_to_localname()
library function that if exploited could lead to unauthorized root
privileges. In order to exploit this flaw, an attacker must first
successfully authenticate to a vulnerable service, which must be
configured to enable the explicit mapping or rules-based mapping
functionality of krb5_aname_to_localname, which is not a default
Mandrakesoft encourages all users to upgrade to these patched krb5
The original patch provided contained a bug where rule-based entries
on systems without HAVE_REGCOMP would not work. These updated packages
provide the second patch provided by Kerberos development team which
fixes that behaviour.
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0