CVE-2015-2694

Severity

57%

Complexity

86%

Confidentiality

81%

The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.

The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.

CVSS 2.0 Base Score 5.8. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N).

Overview

Type

Mit Kerberos 5

First reported 9 years ago

2015-05-25 19:59:00

Last updated 5 years ago

2020-01-21 15:46:00

Affected Software

Mit Kerberos 5 1.12

1.12

Mit Kerberos 5 1.12.1

1.12.1

Mit Kerberos 5 1.12.2

1.12.2

Mit Kerberos 5 1.12.3

1.12.3

Mit Kerberos 5 1.13

1.13

Mit Kerberos 5 1.13.1

1.13.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.