This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
An advisory published by the MIT Kerberos team says :
The password-changing capability of the MIT krb5 administration daemon
(kadmind) has a bug that can cause it to attempt to free() an invalid
pointer under certain error conditions. This can cause the daemon to
crash or induce the execution of arbitrary code (which is believed to
be difficult). No exploit that executes arbitrary code is known to
exist, but it is easy to trigger a denial of service manually.
Some platforms detect attempted freeing of invalid pointers and
protectively terminate the process, preventing arbitrary code
execution on those platforms.
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0