Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-5730


MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.


Published

2018-03-06T20:29:00.657

Last Modified

2025-05-05T14:12:56.457

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 3.8 (LOW)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-90

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mit kerberos_5 < 5-1.21.2 Yes
Operating System fedoraproject fedora 26 Yes
Operating System fedoraproject fedora 27 Yes
Operating System debian debian_linux 8.0 Yes
Operating System debian debian_linux 9.0 Yes
Operating System redhat enterprise_linux_desktop 7.0 Yes
Operating System redhat enterprise_linux_server 7.0 Yes
Operating System redhat enterprise_linux_workstation 7.0 Yes

References