Lucene search

K
archlinuxArchLinuxASA-201806-3
HistoryJun 05, 2018 - 12:00 a.m.

[ASA-201806-3] krb5: insufficient validation

2018-06-0500:00:00
security.archlinux.org
15

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

58.4%

Arch Linux Security Advisory ASA-201806-3

Severity: Medium
Date : 2018-06-05
CVE-ID : CVE-2018-5729 CVE-2018-5730
Package : krb5
Type : insufficient validation
Remote : Yes
Link : https://security.archlinux.org/AVG-586

Summary

The package krb5 before version 1.16.1-1 is vulnerable to insufficient
validation.

Resolution

Upgrade to 1.16.1-1.

pacman -Syu “krb5>=1.16.1-1”

The problems have been fixed upstream in version 1.16.1.

Workaround

None.

Description

  • CVE-2018-5729 (insufficient validation)

A flaw was found in MIT krb5 1.6 or later, an authenticated kadmin user
with permission to add principals to an LDAP Kerberos database can
cause a null dereference in kadmind, or circumvent a DN container
check, by supplying tagged data intended to be internal to the database
module.

  • CVE-2018-5730 (insufficient validation)

A flaw was found in MIT krb5 1.6 or later, an authenticated kadmin user
with permission to add principals to an LDAP Kerberos database can
circumvent a DN containership check by supplying both a “linkdn” and
“containerdn” database argument, or by supplying a DN string which is a
left extension of a container DN string but is not hierarchically
within the container DN.

Impact

An authenticated kadmin user can elevate privileges or crash the
application via a crafted DN.

References

https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer Overflow
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://security.archlinux.org/CVE-2018-5729
https://security.archlinux.org/CVE-2018-5730

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanykrb5< 1.16.1-1UNKNOWN

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

58.4%