Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-5730

Опубликовано: 01 мар. 2018
Источник: redhat
CVSS3: 3.8

Описание

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5krb5Will not fix
Red Hat Enterprise Linux 6krb5Will not fix
Red Hat Enterprise Linux 8krb5Not affected
Red Hat JBoss Core Serviceskrb5Not affected
Red Hat JBoss Enterprise Application Platform 6krb5Will not fix
Red Hat JBoss Enterprise Web Server 2krb5Will not fix
Red Hat Enterprise Linux 7krb5FixedRHSA-2018:307130.10.2018

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-90
https://bugzilla.redhat.com/show_bug.cgi?id=1551082krb5: DN container check bypass by supplying special crafted data

3.8 Low

CVSS3

Связанные уязвимости

CVSS3: 3.8
ubuntu
больше 7 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

CVSS3: 3.8
nvd
больше 7 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

CVSS3: 3.8
debian
больше 7 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission t ...

CVSS3: 3.8
github
больше 3 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

suse-cvrf
больше 6 лет назад

Security update for krb5

3.8 Low

CVSS3

Уязвимость CVE-2018-5730