Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-3576

Опубликовано: 15 апр. 2025
Источник: debian

Описание

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
krb5fixed1.21.2-1package
krb5fixed1.20.1-2+deb12u4bookwormpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2359465

  • CVE relates to issues covered in:

  • https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Tervoort-Breaking-Kerberos-RC4-Cipher-and-Spoofing-Windows-PACs-wp.pdf

  • Since upstream 1.21 (cf. https://web.mit.edu/kerberos/krb5-1.21/) the KDC

  • will no longer issue tickets with RC4 or triple-DES session keys unless

  • explicitly configured with the new allow_rc4 or allow_des3 variables respectively.

  • https://github.com/krb5/krb5/commit/1b57a4d134bbd0e7c52d5885a92eccc815726463

  • https://github.com/krb5/krb5/commit/2cbd847e0e92bc4e219b65c770ae33f851b22afc

Связанные уязвимости

CVSS3: 5.9
ubuntu
7 месяцев назад

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

CVSS3: 5.9
redhat
7 месяцев назад

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

CVSS3: 5.9
nvd
7 месяцев назад

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

CVSS3: 5.9
msrc
2 месяца назад

Krb5: kerberos rc4-hmac-md5 checksum vulnerability enabling message spoofing via md5 collisions

suse-cvrf
13 дней назад

Security update for krb5