n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data. "> OVAL Reference oval:com.ubuntu.bionic:def:20185709000 - CERT Civis.Net
Oval Definition:oval:com.ubuntu.bionic:def:20185709000
Revision Date:2018-01-16Version:1
Title:CVE-2018-5709 on Ubuntu 18.04 LTS (bionic) - negligible.
Description:An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2018-5709
Platform(s):Ubuntu 18.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 18.04 LTS (bionic) is installed.
  • AND The vulnerability of the 'krb5' package in bionic is not known (status: 'needs-triage'). It is pending evaluation.
  • BACK