Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-5730

Опубликовано: 06 мар. 2018
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5.5
CVSS3: 3.8

Описание

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

РелизСтатусПримечание
artful

ignored

end of life
bionic

released

1.16-2ubuntu0.1
cosmic

released

1.16-2ubuntu1.1
devel

not-affected

1.16.1-1
disco

not-affected

1.16.1-1
eoan

not-affected

1.16.1-1
esm-infra-legacy/trusty

released

1.12+dfsg-2ubuntu5.4
esm-infra/bionic

released

1.16-2ubuntu0.1
esm-infra/focal

not-affected

1.16.1-1
esm-infra/xenial

released

1.13.2+dfsg-5ubuntu2.1

Показывать по

Ссылки на источники

EPSS

Процентиль: 60%
0.00393
Низкий

5.5 Medium

CVSS2

3.8 Low

CVSS3

Связанные уязвимости

CVSS3: 3.8
redhat
больше 7 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

CVSS3: 3.8
nvd
больше 7 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

CVSS3: 3.8
debian
больше 7 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission t ...

CVSS3: 3.8
github
больше 3 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

suse-cvrf
больше 6 лет назад

Security update for krb5

EPSS

Процентиль: 60%
0.00393
Низкий

5.5 Medium

CVSS2

3.8 Low

CVSS3