Mandrake Linux Security Advisory : krb5 (MDKSA-2004:056-1)

critical Nessus Plugin ID 14155


The remote Mandrake Linux host is missing one or more security updates.


Multiple buffer overflows exist in the krb5_aname_to_localname() library function that if exploited could lead to unauthorized root privileges. In order to exploit this flaw, an attacker must first successfully authenticate to a vulnerable service, which must be configured to enable the explicit mapping or rules-based mapping functionality of krb5_aname_to_localname, which is not a default configuration.

Mandrakesoft encourages all users to upgrade to these patched krb5 packages.

Update :

The original patch provided contained a bug where rule-based entries on systems without HAVE_REGCOMP would not work. These updated packages provide the second patch provided by Kerberos development team which fixes that behaviour.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 14155

File Name: mandrake_MDKSA-2004-056.nasl

Version: 1.22

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:ftp-client-krb5, p-cpe:/a:mandriva:linux:ftp-server-krb5, p-cpe:/a:mandriva:linux:krb5-devel, p-cpe:/a:mandriva:linux:krb5-libs, p-cpe:/a:mandriva:linux:krb5-server, p-cpe:/a:mandriva:linux:krb5-workstation, p-cpe:/a:mandriva:linux:lib64krb51, p-cpe:/a:mandriva:linux:lib64krb51-devel, p-cpe:/a:mandriva:linux:libkrb51, p-cpe:/a:mandriva:linux:libkrb51-devel, p-cpe:/a:mandriva:linux:telnet-client-krb5, p-cpe:/a:mandriva:linux:telnet-server-krb5, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:9.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 6/9/2004

Reference Information

CVE: CVE-2004-0523

MDKSA: 2004:056-1