Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-5709

Опубликовано: 15 янв. 2018
Источник: redhat
CVSS3: 6.3

Описание

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

Отчет

This is essentially an integer truncation issue, and not an integer overflow. We have determined that this should not affect any other data allocated close to the 16-bit integer in question "dbentry-> n_key_data". Red Hat Product Security does not consider this issue as a security flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5krb5Not affected
Red Hat Enterprise Linux 6krb5Not affected
Red Hat Enterprise Linux 7krb5Not affected
Red Hat Enterprise Linux 8krb5Not affected
Red Hat JBoss Core Serviceskrb5Not affected
Red Hat JBoss Enterprise Application Platform 6krb5Not affected
Red Hat JBoss Enterprise Web Server 2krb5Not affected

Показывать по

Дополнительная информация

Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1535554krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

CVSS3: 7.5
nvd
около 8 лет назад

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

CVSS3: 7.5
debian
около 8 лет назад

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The ...

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

6.3 Medium

CVSS3