First published: Tue Jan 16 2018(Updated: )
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos | <=5-1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5709 is a vulnerability in MIT Kerberos 5 that allows an attacker to exploit an integer overflow issue in the kadmin server.
CVE-2018-5709 affects MIT Kerberos 5 versions up to and including 1.16.
The severity of CVE-2018-5709 is high, with a severity score of 7.5.
CVE-2018-5709 has a CWE ID of 190, which is an integer overflow vulnerability.
To fix CVE-2018-5709, it is recommended to update to a version of MIT Kerberos 5 that is not affected by this vulnerability.