Lucene search

K
freebsdFreeBSD4CCBD40D-03F7-11E0-BF50-001A926C7637
HistoryNov 30, 2010 - 12:00 a.m.

krb5 -- client impersonation vulnerability

2010-11-3000:00:00
vuxml.freebsd.org
14

2.1 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

73.6%

The MIT Kerberos team reports:

MIT krb5 KDC may issue tickets not requested
by a client, based on an attacker-chosen KrbFastArmoredReq.
An authenticated remote attacker that controls a legitimate service
principal could obtain a valid service ticket to itself containing
valid KDC-generated authorization data for a client whose TGS-REQ it
has intercepted. The attacker could then use this ticket for
S4U2Proxy to impersonate the targeted client even if the client
never authenticated to the subverted service. The vulnerable
configuration is believed to be rare.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchkrb5= 1.7.0UNKNOWN
FreeBSDanynoarchkrb5< 1.7.2UNKNOWN

2.1 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

73.6%