Mandrake Linux Security Advisory : krb5 (MDKSA-2002:073-1)

Critical Nessus Plugin ID 13973


The remote Mandrake Linux host is missing one or more security updates.


A stack-based buffer overflow in the implementation of the Kerberos v4 compatibility administration daemon (kadmind4) in the krb5 package can be exploited to gain unauthorized root access to a KDC host.
Authentication to the daemon is not required to successfully perform the attack and according to MIT at least one exploit is known to exist. kadmind4 is used only by sites that require compatibility with legacy administrative clients, and sites that do not have these needs are likely not using kadmind4 and are not affected.

MandrakeSoft encourages all users who use Kerberos to upgrade to these packages immediately.

Update :

The /etc/rc.d/init.d/kadmin initscript improperly pointed to a non-existent location for the kadmind binary. This update corrects the problem.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 13973

File Name: mandrake_MDKSA-2002-073.nasl

Version: $Revision: 1.21 $

Type: local

Published: 2004/07/31

Modified: 2015/09/14

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ftp-client-krb5, p-cpe:/a:mandriva:linux:ftp-server-krb5, p-cpe:/a:mandriva:linux:krb5-devel, p-cpe:/a:mandriva:linux:krb5-libs, p-cpe:/a:mandriva:linux:krb5-server, p-cpe:/a:mandriva:linux:krb5-workstation, p-cpe:/a:mandriva:linux:telnet-client-krb5, p-cpe:/a:mandriva:linux:telnet-server-krb5, cpe:/o:mandrakesoft:mandrake_linux:8.1, cpe:/o:mandrakesoft:mandrake_linux:8.2, cpe:/o:mandrakesoft:mandrake_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2003/01/13

Reference Information

CVE: CVE-2002-1235

CERT: 875073

MDKSA: 2002:073-1