Description
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1643-1 | krb5 security update |
Debian DLA |
DLA-2771-1 | krb5 security update |
EUVD |
EUVD-2018-17499 | MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:40:51.262Z
Reserved: 2018-01-16T00:00:00.000Z
Link: CVE-2018-5730
No data.
Status : Analyzed
Published: 2018-03-06T20:29:00.657
Modified: 2025-05-05T14:12:56.457
Link: CVE-2018-5730
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD