5
CVSSv2

CVE-2018-5709

Published: 16/01/2018 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 447
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue exists in MIT Kerberos 5 (aka krb5) up to and including 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos

Vendor Advisories

Debian Bug report logs - #889684 krb5: CVE-2018-5709 Package: src:krb5; Maintainer for src:krb5 is Sam Hartman <hartmans@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 5 Feb 2018 20:51:01 UTC Severity: important Tags: security, upstream Found in version krb5/116-2 Done: Benjamin Kad ...
An issue was discovered in MIT Kerberos 5 (aka krb5) through 116 There is a variable "dbentry->n_key_data" in kadmin/dbutil/dumpc that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data An attacker can use this vulnerability to affect other artifacts of the database as we know tha ...
An issue was discovered in MIT Kerberos 5 (aka krb5) through 116 There is a variable "dbentry->n_key_data" in kadmin/dbutil/dumpc that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data An attacker can use this vulnerability to affect other artifacts of the database as we know tha ...