Unrated severityNVD Advisory· Published Mar 6, 2018· Updated Aug 5, 2024
CVE-2018-5730
CVE-2018-5730
Description
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
Affected products
16- osv-coords16 versionspkg:rpm/opensuse/krb5&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/krb5-mini&distro=openSUSE%20Leap%2015.0pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/krb5&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3
< 1.15.2-lp150.5.6.1+ 15 more
- (no CPE)range: < 1.15.2-lp150.5.6.1
- (no CPE)range: < 1.15.2-lp150.5.6.1
- (no CPE)range: < 1.12.5-40.23.2
- (no CPE)range: < 1.12.5-40.23.2
- (no CPE)range: < 1.15.2-6.6.2
- (no CPE)range: < 1.15.2-6.6.2
- (no CPE)range: < 1.6.3-133.49.113.7.1
- (no CPE)range: < 1.12.5-40.23.2
- (no CPE)range: < 1.12.5-40.23.2
- (no CPE)range: < 1.12.5-40.23.2
- (no CPE)range: < 1.6.3-133.49.113.7.1
- (no CPE)range: < 1.12.5-40.23.2
- (no CPE)range: < 1.12.5-40.23.2
- (no CPE)range: < 1.6.3-133.49.113.7.1
- (no CPE)range: < 1.12.5-40.23.2
- (no CPE)range: < 1.12.5-40.23.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- access.redhat.com/errata/RHBA-2019:0327mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:3071mitrevendor-advisoryx_refsource_REDHAT
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/mitrevendor-advisoryx_refsource_FEDORA
- www.securitytracker.com/id/1042071mitrevdb-entryx_refsource_SECTRACK
- bugs.debian.org/cgi-bin/bugreport.cgimitrex_refsource_CONFIRM
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1mitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2019/01/msg00020.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2021/09/msg00019.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.