Untriaged
Permalink
CVE-2025-3576
5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Krb5: kerberos rc4-hmac-md5 checksum vulnerability enabling message spoofing via md5 collisions
A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
References
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
- RHSA-2025:11487 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13664 x_refsource_REDHAT vendor-advisory
- RHSA-2025:13777 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15000 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15001 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15002 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15003 x_refsource_REDHAT vendor-advisory
- RHSA-2025:15004 x_refsource_REDHAT vendor-advisory
- RHSA-2025:8411 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9418 x_refsource_REDHAT vendor-advisory
- RHSA-2025:9430 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-3576 x_refsource_REDHAT vdb-entry
- RHBZ#2359465 issue-tracking x_refsource_REDHAT
- https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
Affected products
krb5
- *
- <1.22
rhcos
discovery/discovery-server-rhel9
- *
aap-cloud-metrics-collector-container
ansible-automation-platform-24/ee-minimal-rhel9
ansible-automation-platform-25/ee-minimal-rhel8
ansible-automation-platform-24/ee-supported-rhel8
ansible-automation-platform-24/ee-supported-rhel9
registry.redhat.io/discovery/discovery-server-rhel9
- *
ansible-automation-platform-24/ansible-builder-rhel9
ansible-automation-platform-25/ansible-builder-rhel8
ansible-automation-platform-24/platform-resource-runner-rhel8
ansible-automation-platform-25/platform-resource-runner-rhel8
Matching in nixpkgs
pkgs.pam_krb5
PAM module allowing PAM-aware applications to authenticate users by performing an AS exchange with a Kerberos KDC
-
nixos-unstable -
- nixpkgs-unstable krb5-4.11
pkgs.python312Packages.krb5
Kerberos API bindings for Python
-
nixos-unstable -
- nixpkgs-unstable krb5-0.7.1
pkgs.python313Packages.krb5
Kerberos API bindings for Python
-
nixos-unstable -
- nixpkgs-unstable krb5-0.7.1
Package maintainers
-
@de11n Elliot Cameron <nixpkgs-commits@deshaw.com>
-
@invokes-su Souvik Sen <nixpkgs-commits@deshaw.com>
-
@despsyched Priyanshu Tripathi <priyanshu.tripathi@deshaw.com>