CVE-2015-3206: python-kerberos vulnerable to KDC spoofing attacks
(updated )
The checkPassword
function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack.
References
- bugzilla.redhat.com/show_bug.cgi?id=1223802
- github.com/advisories/GHSA-mffc-9gx5-99g3
- github.com/apple/ccs-pykerberos
- github.com/apple/ccs-pykerberos/commit/9cb61c93f9b24dd18a0a315f3df5445529c5c333
- github.com/apple/ccs-pykerberos/issues/31
- github.com/pypa/advisory-database/tree/main/vulns/kerberos/PYSEC-2017-49.yaml
- github.com/pypa/advisory-database/tree/main/vulns/pykerberos/PYSEC-2017-66.yaml
- nvd.nist.gov/vuln/detail/CVE-2015-3206
- pypi.python.org/pypi/kerberos
- web.archive.org/web/20150910143429/https://trac.calendarserver.org/ticket/833
- web.archive.org/web/20200228090829/http://www.securityfocus.com/bid/74760
Detect and mitigate CVE-2015-3206 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →