MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
2010-12-02T16:22:21.207
2025-04-11T00:51:21.963
Deferred
CVSSv3.0: 6.3 (MEDIUM)
AV:N/AC:M/Au:S/C:N/I:P/A:N
6.8
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mit | kerberos_5 | 1.8 | Yes |
Application | mit | kerberos_5 | 1.8.1 | Yes |
Application | mit | kerberos_5 | 1.8.2 | Yes |
Application | mit | kerberos_5 | 1.8.3 | Yes |