MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T03:26:12.249Z
Reserved: 2010-10-20T00:00:00
Link: CVE-2010-4020

No data.

Status : Modified
Published: 2010-12-02T16:22:21.207
Modified: 2024-11-21T01:20:04.537
Link: CVE-2010-4020
