Integer Overflow or Wraparound Affecting kerberos package, versions [,1.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-KERBEROS-3006815
  • published12 Jan 2022
  • disclosed16 Jan 2018
  • creditUnknown

Introduced: 16 Jan 2018

CVE-2018-5709  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade kerberos to version 1.0 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.

References

CVSS Scores

version 3.1