This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
A stack-based buffer overflow vulnerability was discovered in the RPC
library used by Kerberos' kadmind program by Tenable Network Security.
A remote unauthenticated user who could access kadmind would be able
to trigger the flaw and cause it to crash (CVE-2007-3999). This issue
is only applicable to Kerberos 1.4 and higher.
Garrett Wollman found an uninitialized pointer vulnerability in
kadmind which a remote unauthenticated attacker able to access kadmind
could exploit to cause kadmind to crash (CVE-2007-4000). This issue is
only applicable to Kerberos 1.5 and higher.
The MIT Kerberos Team found a problem with the originally published
patch for CVE-2007-3999. A remote unauthenticated attacker able to
access kadmind could trigger this flaw and cause kadmind to crash.
Updated packages have been patched to prevent these issues.
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Mandriva Local Security Checks
Nessus Plugin ID: 26006 (mandrake_MDKSA-2007-174.nasl)
Bugtraq ID: 25534
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now