First published: Thu Mar 01 2018(Updated: )
A flaw was found in MIT krb5 1.6 or later, an authenticated kadmin user with permission to add principals to an LDAP Kerberos database can cause a null dereference in kadmind, or circumvent a DN container check, by supplying tagged data intended to be internal to the database module. Reference: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a> Upstream patch: <a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/krb5 | <=1.7dfsg~beta1-1<=1.16-2 | |
debian/krb5 | 1.18.3-6+deb11u5 1.20.1-2+deb12u2 1.21.3-3 | |
Kerberos 5 (libkrb5) | >=5-1.6<5-1.21.2 | |
Fedora | =26 | |
Fedora | =27 | |
Debian | =8.0 | |
Debian | =9.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Kerberos 5 (libkrb5) | >=5-1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-5729.
CVE-2018-5729 has a severity level of 4.7 (high).
MIT krb5 1.6 or later versions are affected by CVE-2018-5729.
An authenticated kadmin with permission to add principals to an LDAP Kerberos database can cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
Yes, you can find official references for CVE-2018-5729 at the following links: http://www.securitytracker.com/id/1042071, https://access.redhat.com/errata/RHBA-2019:0327, https://access.redhat.com/errata/RHSA-2018:3071.