First published: Thu May 21 2015(Updated: )
The `checkPassword` function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pykerberos | >=0<1.1.6 | 1.1.6 |
pip/kerberos | <=1.2.5 | |
Apple PyKerberos |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3206 is considered to have a medium severity due to its potential for causing denial of service and is subject to man-in-the-middle attacks.
To fix CVE-2015-3206, upgrade to pykerberos version 1.1.6 or later, or kerberos version 1.2.6 or later.
CVE-2015-3206 can lead to denial of service and other unspecified impacts due to lack of authentication of the KDC.
CVE-2015-3206 affects the pykerberos library versions prior to 1.1.6 and kerberos versions up to 1.2.5.
Yes, CVE-2015-3206 can be exploited by remote attackers performing man-in-the-middle attacks.