First published: Fri Mar 02 2018(Updated: )
A flaw was found in MIT krb5 1.6 or later, an authenticated kadmin user with permission to add principals to an LDAP Kerberos database can circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN. Reference: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869</a> Upstream patch: <a href="https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1">https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | >=5-1.6 | |
Fedoraproject Fedora | =26 | |
Fedoraproject Fedora | =27 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
MIT Kerberos 5 | >=5-1.6<5-1.21.2 | |
debian/krb5 | 1.18.3-6+deb11u5 1.20.1-2+deb12u2 1.21.3-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5730 is a vulnerability in MIT krb5 1.6 or later that allows an authenticated kadmin to circumvent a DN containership check in an LDAP Kerberos database.
CVE-2018-5730 has a severity score of 3.8, which is classified as medium severity.
MIT Kerberos 5, Fedoraproject Fedora, Debian Debian Linux, and Redhat Enterprise Linux(Different versions) are affected by CVE-2018-5730.
To fix CVE-2018-5730, update to the recommended versions: 1.17-3+deb10u4, 1.17-3+deb10u6, 1.18.3-6+deb11u4, 1.18.3-6+deb11u3, 1.20.1-2+deb12u1, or 1.20.1-5.
You can find more information about CVE-2018-5730 at the following references: http://www.securitytracker.com/id/1042071, https://access.redhat.com/errata/RHBA-2019:0327, and https://access.redhat.com/errata/RHSA-2018:3071.