MIT Kerberos Lets Remote Authenticated Users Gain Elevated Privileges in Certain Cases
|
SecurityTracker Alert ID: 1042071 |
SecurityTracker URL: http://securitytracker.com/id/1042071
|
CVE Reference:
CVE-2018-5729, CVE-2018-5730
(Links to External Site)
|
Date: Nov 12 2018
|
Impact:
User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): krb5 1.6 and later
|
Description:
Two vulnerabilities were reported in MIT Kerberos. A remote authenticated user can gain elevated privileges in certain cases.
A remote authenticated user with permission to add principals to an LDAP Kerberos database can circumvent a DN container check by supply specially crafted data to the target database module [CVE-2018-5729].
Sharwan Ram and Pooja Anil reported this vulnerability.
A remote authenticated user with permission to add principals to an LDAP Kerberos database can supply specially crafted data containing both a "linkdn" and "containerdn" database argument to the target database module [CVE-2018-5730].
|
Impact:
A remote authenticated user can gain elevated privileges on the target system in certain cases.
|
Solution:
The vendor has issued a fix.
The vendor advisory is available at:
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
|
Vendor URL: github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|