Lucene search

K
freebsdFreeBSD406636FE-055D-11E5-AAB1-D050996490D0
HistoryMay 25, 2015 - 12:00 a.m.

krb5 -- requires_preauth bypass in PKINIT-enabled KDC

2015-05-2500:00:00
vuxml.freebsd.org
23

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

74.6%

MIT reports:

In MIT krb5 1.12 and later, when the KDC is configured
with PKINIT support, an unauthenticated remote attacker
can bypass the requires_preauth flag on a client principal
and obtain a ciphertext encrypted in the principal’s
long-term key. This ciphertext could be used to conduct
an off-line dictionary attack against the user’s password.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchkrb5< 1.13.2UNKNOWN
FreeBSDanynoarchkrb5-112< 1.12.3_2UNKNOWN

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

74.6%