Vulnerability Details : CVE-2018-5729
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2018-5729
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-5729
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-5729
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
4.7
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L |
1.2
|
3.4
|
NIST |
CWE ids for CVE-2018-5729
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-5729
-
https://access.redhat.com/errata/RHSA-2018:3071
RHSA-2018:3071 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
[SECURITY] Fedora 27 Update: krb5-1.15.2-7.fc27 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
[SECURITY] Fedora 26 Update: krb5-1.15.2-7.fc26 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://access.redhat.com/errata/RHBA-2019:0327
RHBA-2019:0327 - Bug Fix Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
[SECURITY] [DLA 2771-1] krb5 security updateMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1042071
MIT Kerberos Lets Remote Authenticated Users Gain Elevated Privileges in Certain Cases - SecurityTrackerVDB Entry;Third Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
#891869 - krb5: CVE-2018-5729 CVE-2018-5730 - Debian Bug report logsThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
[SECURITY] Fedora 26 Update: krb5-1.15.2-7.fc26 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
[SECURITY] Fedora 27 Update: krb5-1.15.2-7.fc27 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
[SECURITY] [DLA 1643-1] krb5 security updateMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1551083
1551083 – (CVE-2018-5729) CVE-2018-5729 krb5: null dereference in kadmind or DN container check bypass by supplying special crafted dataIssue Tracking;Patch;Third Party Advisory
-
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
Fix flaws in LDAP DN checking · krb5/krb5@e1caf6f · GitHubPatch;Third Party Advisory
Jump to