CVE-2025-3576
Publication date 15 April 2025
Last updated 30 May 2025
Ubuntu priority
Cvss 3 Severity Score
A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
Status
Package | Ubuntu Release | Status |
---|---|---|
krb5 | 25.04 plucky |
Not affected
|
24.10 oracular |
Not affected
|
|
24.04 LTS noble |
Fixed 1.20.1-6ubuntu2.6
|
|
22.04 LTS jammy |
Fixed 1.19.2-2ubuntu0.7
|
|
20.04 LTS focal |
Fixed 1.17-6ubuntu4.11
|
|
18.04 LTS bionic |
Fixed 1.16-2ubuntu0.4+esm5
|
|
16.04 LTS xenial |
Fixed 1.13.2+dfsg-5ubuntu2.2+esm7
|
|
14.04 LTS trusty |
Fixed 1.12+dfsg-2ubuntu5.4+esm7
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
hlibk
Vulnerability is present in the implementation of RC4. Using stronger encryption types is preferred.
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-7542-1
- Kerberos vulnerability
- 28 May 2025