Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-5709

Опубликовано: 16 янв. 2018
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support
cosmic

ignored

end of life
devel

ignored

see notes
disco

ignored

end of life
eoan

ignored

end of life
esm-infra-legacy/trusty

ignored

see notes
esm-infra/bionic

ignored

see notes
esm-infra/focal

ignored

see notes
esm-infra/xenial

ignored

see notes

Показывать по

EPSS

Процентиль: 81%
0.01485
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 6.3
redhat
около 8 лет назад

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

CVSS3: 7.5
nvd
около 8 лет назад

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

CVSS3: 7.5
debian
около 8 лет назад

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The ...

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

EPSS

Процентиль: 81%
0.01485
Низкий

5 Medium

CVSS2

7.5 High

CVSS3