First published: Wed Feb 05 2025(Updated: )
Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that Kerberos incorrectly authenticated certain responses. An attacker able to intercept communications between a RADIUS client and server could possibly use this issue to forge responses, bypass authentication, and access network devices and services. This update introduces support for the Message-Authenticator attribute in non-EAP authentication methods for communications between Kerberos and a RADIUS server.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libk5crypto3 | <1.21.3-3ubuntu0.1 | 1.21.3-3ubuntu0.1 |
Ubuntu Linux | =24.10 | |
All of | ||
ubuntu/libkrad0 | <1.21.3-3ubuntu0.1 | 1.21.3-3ubuntu0.1 |
Ubuntu Linux | =24.10 | |
All of | ||
ubuntu/libk5crypto3 | <1.20.1-6ubuntu2.3 | 1.20.1-6ubuntu2.3 |
Ubuntu Linux | =24.04 | |
All of | ||
ubuntu/libkrad0 | <1.20.1-6ubuntu2.3 | 1.20.1-6ubuntu2.3 |
Ubuntu Linux | =24.04 | |
All of | ||
ubuntu/libk5crypto3 | <1.19.2-2ubuntu0.5 | 1.19.2-2ubuntu0.5 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/libkrad0 | <1.19.2-2ubuntu0.5 | 1.19.2-2ubuntu0.5 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/libk5crypto3 | <1.17-6ubuntu4.8 | 1.17-6ubuntu4.8 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/libkrad0 | <1.17-6ubuntu4.8 | 1.17-6ubuntu4.8 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/libk5crypto3 | <1.16-2ubuntu0.4+esm3 | 1.16-2ubuntu0.4+esm3 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libkrad0 | <1.16-2ubuntu0.4+esm3 | 1.16-2ubuntu0.4+esm3 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libk5crypto3 | <1.13.2+dfsg-5ubuntu2.2+esm6 | 1.13.2+dfsg-5ubuntu2.2+esm6 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/libkrad0 | <1.13.2+dfsg-5ubuntu2.2+esm6 | 1.13.2+dfsg-5ubuntu2.2+esm6 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/libk5crypto3 | <1.12+dfsg-2ubuntu5.4+esm6 | 1.12+dfsg-2ubuntu5.4+esm6 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/libkrad0 | <1.12+dfsg-2ubuntu5.4+esm6 | 1.12+dfsg-2ubuntu5.4+esm6 |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The USN-7257-1 vulnerability is considered high risk due to the potential for attackers to forge authentication responses.
To resolve USN-7257-1, update the affected packages to the recommended versions specific to your Ubuntu distribution.
USN-7257-1 affects multiple versions of libk5crypto3 and libkrad0 on various Ubuntu releases.
USN-7257-1 exploits a flaw in Kerberos that allows interception and forgery of authentication responses between RADIUS clients and servers.
You can check your installed versions of libk5crypto3 and libkrad0 against the versions listed in the USN-7257-1 advisory to determine if you are affected.