An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-17478 An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T05:40:51.202Z

Reserved: 2018-01-16T00:00:00

Link: CVE-2018-5709

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-16T09:29:00.500

Modified: 2024-11-21T04:09:13.037

Link: CVE-2018-5709

cve-icon Redhat

Severity :

Publid Date: 2018-01-15T00:00:00Z

Links: CVE-2018-5709 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses