Improper Authentication Affecting libpam-krb5 package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.3% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-LIBPAMKRB5-5756440
  • published6 Jul 2023
  • disclosed22 Jun 2023

Introduced: 22 Jun 2023

CVE-2023-3326  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

There is no fixed version for Debian:13 libpam-krb5.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libpam-krb5 package and not the libpam-krb5 package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.

CVSS Scores

version 3.1