MIT Kerberos 5 (aka krb5) 1.8.x up to and including 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mit kerberos 5 1.8 |
||
mit kerberos 5 1.8.3 |
||
mit kerberos 5 1.8.1 |
||
mit kerberos 5 1.8.2 |