First published: Fri Jun 28 2024(Updated: )
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application. Reference and upstream patch: <a href="https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef">https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef</a>
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application | <1.21.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2294677 is considered critical due to its potential impact on the confidentiality and integrity of GSS krb5 wrap tokens.
To fix REDHAT-BUG-2294677, update to MIT Kerberos 5 version 1.21.3 or later.
REDHAT-BUG-2294677 affects MIT Kerberos 5 versions below 1.21.3.
REDHAT-BUG-2294677 allows an attacker to manipulate the plaintext Extra Count field, leading to token truncation.
Yes, there is an upstream patch available to address the vulnerability in REDHAT-BUG-2294677.