Summary
The remote host is missing updates announced in
advisory GLSA 200504-04.
Solution
All mit-krb5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-crypt/mit-krb5-1.3.6-r2'
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200504-04 http://bugs.gentoo.org/show_bug.cgi?id=87145
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-001-telnet.txt
Insight
The mit-krb5 telnet client is vulnerable to two buffer overflows, which could allow a malicious telnet server operator to execute arbitrary code.
Severity
Classification
-
CVE CVE-2005-0468, CVE-2005-0469 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities