GLSA-201201-14 : MIT Kerberos 5 Applications: Multiple vulnerabilities

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-201201-14
(MIT Kerberos 5 Applications: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in MIT Kerberos 5
An error in the FTP daemon prevents it from dropping its initial
effective group identifier (CVE-2011-1526).
A boundary error in the telnet daemon and client could cause a buffer
overflow (CVE-2011-4862).

Impact :

An unauthenticated remote attacker may be able to execute arbitrary code
with the privileges of the user running the telnet daemon or client.
Furthermore, an authenticated remote attacker may be able to read or
write files owned by the same group as the effective group of the FTP

Workaround :

There is no known workaround at this time.

See also :

Solution :

All MIT Kerberos 5 Applications users should upgrade to the latest
# emerge --sync
# emerge --ask --oneshot --verbose

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 57656 ()

Bugtraq ID: 48571

CVE ID: CVE-2011-1526

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now