n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data. "> OVAL Reference oval:com.ubuntu.disco:def:201857090000000 - CERT Civis.Net
Oval Definition:oval:com.ubuntu.disco:def:201857090000000
Revision Date:2018-01-16Version:1
Title:CVE-2018-5709 on Ubuntu 19.04 (disco) - negligible.
Description:An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2018-5709
Platform(s):Ubuntu 19.04
Product(s):
Definition Synopsis
  • Ubuntu 19.04 (disco) is installed.
  • AND krb5 package in disco is affected and needs fixing.
  • BACK