MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1643-1 | krb5 security update |
![]() |
DLA-2771-1 | krb5 security update |
![]() |
EUVD-2018-17499 | MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:40:51.262Z
Reserved: 2018-01-16T00:00:00
Link: CVE-2018-5730

No data.

Status : Analyzed
Published: 2018-03-06T20:29:00.657
Modified: 2025-05-05T14:12:56.457
Link: CVE-2018-5730


No data.