FreeBSD Ports: krb5

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt http://osvdb.org/69609 http://www.vuxml.org/freebsd/0d57c1d9-03f4-11e0-bf50-001a926c7637.html
Insight
The following package is affected: krb5 CVE-2010-1324 MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.