This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200904-09
(MIT Kerberos 5: Multiple vulnerabilities)
Multiple vulnerabilities have been reported in MIT Kerberos 5:
A free() call on an uninitialized pointer in the ASN.1 decoder
when decoding an invalid encoding (CVE-2009-0846).
overread in the SPNEGO GSS-API application, reported by Apple Product
A NULL pointer dereference in the
SPNEGO GSS-API application, reported by Richard Evans
An incorrect length check inside an ASN.1
decoder leading to spurious malloc() failures (CVE-2009-0847).
A remote unauthenticated attacker could exploit the first vulnerability
to cause a Denial of Service or, in unlikely circumstances, execute
arbitrary code on the host running krb5kdc or kadmind with root
privileges and compromise the Kerberos key database. Exploitation of
the other vulnerabilities might lead to a Denial of Service in kadmind,
krb5kdc, or other daemons performing authorization against Kerberos
that utilize GSS-API or an information disclosure.
There is no known workaround at this time.
See also :
All MIT Kerberos 5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-crypt/mit-krb5-1.6.3-r6'
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 36137 (gentoo_GLSA-200904-09.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now