The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-265-2 | pykerberos regression update |
EUVD |
EUVD-2017-0067 | The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack. |
Github GHSA |
GHSA-mffc-9gx5-99g3 | python-kerberos vulnerable to KDC spoofing attacks |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:32.006Z
Reserved: 2015-04-10T00:00:00
Link: CVE-2015-3206
No data.
Status : Deferred
Published: 2017-08-25T18:29:00.637
Modified: 2025-04-20T01:37:25.860
Link: CVE-2015-3206
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA