This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
The MIT Kerberos team reports :
MIT krb5 incorrectly accepts an unkeyed checksum for PAC signatures.
An authenticated remote attacker can forge PACs if using a KDC that
does not filter client-provided PAC data. This can result in privilege
escalation against a service that relies on PAC contents to make
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.2
Public Exploit Available : false