SynopsisThe remote FreeBSD host is missing a security-related update.
DescriptionThe MIT Kerberos team reports :
MIT krb5 incorrectly accepts an unkeyed checksum for PAC signatures.
An authenticated remote attacker can forge PACs if using a KDC that does not filter client-provided PAC data. This can result in privilege escalation against a service that relies on PAC contents to make authorization decisions.
SolutionUpdate the affected package.