A flaw was found in the OTP kdcpreauth module of MIT Kerberos. A remote attacker could use this flaw to bypass the requires_preauth flag on a client principal and obtain a ciphertext encrypted in the principal's long-term key. This ciphertext could be used to conduct an off-line dictionary attack against the user's password.
Find out more about CVE-2015-2694 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the version of krb5 package as shipped with Red Hat Enterprise Linux 5 and 6.
Base Score | 5.8 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:P/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (krb5) | RHSA-2015:2154 | 2015-11-19 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 6 | krb5 | Not affected |
Red Hat Enterprise Linux 5 | krb5 | Not affected |