Lucene search

K
amazonAmazonALAS-2018-1129
HistoryJan 23, 2019 - 6:58 p.m.

Low: krb5

2019-01-2318:58:00
alas.aws.amazon.com
52

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

58.6%

Issue Overview:

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a “linkdn” and “containerdn” database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN. (CVE-2018-5730)

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module. (CVE-2018-5729)

Affected Packages:

krb5

Issue Correction:
Run yum update krb5 to update your system.

New Packages:

i686:  
    krb5-devel-1.15.1-34.44.amzn1.i686  
    krb5-workstation-1.15.1-34.44.amzn1.i686  
    krb5-pkinit-openssl-1.15.1-34.44.amzn1.i686  
    krb5-server-1.15.1-34.44.amzn1.i686  
    krb5-server-ldap-1.15.1-34.44.amzn1.i686  
    libkadm5-1.15.1-34.44.amzn1.i686  
    krb5-libs-1.15.1-34.44.amzn1.i686  
    krb5-debuginfo-1.15.1-34.44.amzn1.i686  
  
src:  
    krb5-1.15.1-34.44.amzn1.src  
  
x86_64:  
    krb5-server-ldap-1.15.1-34.44.amzn1.x86_64  
    krb5-devel-1.15.1-34.44.amzn1.x86_64  
    krb5-debuginfo-1.15.1-34.44.amzn1.x86_64  
    krb5-workstation-1.15.1-34.44.amzn1.x86_64  
    libkadm5-1.15.1-34.44.amzn1.x86_64  
    krb5-libs-1.15.1-34.44.amzn1.x86_64  
    krb5-server-1.15.1-34.44.amzn1.x86_64  
    krb5-pkinit-openssl-1.15.1-34.44.amzn1.x86_64  

Additional References

Red Hat: CVE-2018-5729, CVE-2018-5730

Mitre: CVE-2018-5729, CVE-2018-5730

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

58.6%