The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-265-2 pykerberos regression update
EUVD EUVD EUVD-2017-0067 The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack.
Github GHSA Github GHSA GHSA-mffc-9gx5-99g3 python-kerberos vulnerable to KDC spoofing attacks
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T05:39:32.006Z

Reserved: 2015-04-10T00:00:00

Link: CVE-2015-3206

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-08-25T18:29:00.637

Modified: 2025-04-20T01:37:25.860

Link: CVE-2015-3206

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-05-21T00:00:00Z

Links: CVE-2015-3206 - Bugzilla

cve-icon OpenCVE Enrichment

No data.