FreeBSD Ports: krb5

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-001.txt http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-002.txt http://www.vuxml.org/freebsd/9ac0f9c4-492b-11df-83fb-0015587e2cc1.html
Insight
The following package is affected: krb5 CVE-2010-0283 The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request. CVE-2010-0628 The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2 and 1.8 before 1.8.1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid packet that triggers incorrect preparation of an error token.