Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-3576

Опубликовано: 15 апр. 2025
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

Отчет

This issue is classified as a moderate severity vulnerability because it affects the handling of PKINIT requests during ASN.1 decoding in krb5. Exploitation requires specific and uncommon configurations, including a Kerberos environment with PKINIT enabled. Additionally, successful exploitation depends on triggering specific memory allocation failures or parser behaviors, contributing to a high attack complexity.The attack requires that PKINIT is actively configured and in use, and cannot be exploited remotely without this setup in place, making the practical risk limited in standard environments.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2aap-cloud-metrics-collector-containerFix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel9Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-supported-rhel9Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/platform-resource-runner-rhel8Fix deferred
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/ansible-builder-rhel8Fix deferred
Red Hat Enterprise Linux 6krb5Out of support scope
Red Hat Enterprise Linux 7krb5Out of support scope
Red Hat OpenShift Container Platform 4rhcosFix deferred
Red Hat Enterprise Linux 10krb5FixedRHSA-2025:941824.06.2025
Red Hat Enterprise Linux 8krb5FixedRHSA-2025:841103.06.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-328
https://bugzilla.redhat.com/show_bug.cgi?id=2359465krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions

EPSS

Процентиль: 4%
0.00021
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
4 месяца назад

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

CVSS3: 5.9
nvd
4 месяца назад

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

CVSS3: 5.9
debian
4 месяца назад

A vulnerability in the MIT Kerberos implementation allows GSSAPI-prote ...

rocky
8 дней назад

Moderate: krb5 security update

CVSS3: 5.9
github
4 месяца назад

A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.

EPSS

Процентиль: 4%
0.00021
Низкий

5.9 Medium

CVSS3