This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
A vulnerability was found in the username handling of the MIT krb5
telnet daemon. A remote attacker that could access the telnet port of
a target machine could login as root without requiring a password
Buffer overflows in the kadmin server daemon were discovered that
could be exploited by a remote attacker able to access the KDC.
Successful exploitation could allow for the execution of arbitrary
code with the privileges of the KDC or kadmin server processes
Finally, a double-free flaw was discovered in the GSSAPI library used
by the kadmin server daemon, which could lead to a denial of service
condition or the execution of arbitrary code with the privileges of
the KDC or kadmin server processes (CVE-2007-1216).
Updated packages have been patched to address this issue.
Packages for Mandriva Linux 2007.1 are now available.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.8
Public Exploit Available : true
Family: Mandriva Local Security Checks
Nessus Plugin ID: 24943 (mandrake_MDKSA-2007-077.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now