CVE-2018-5710

Source
https://cve.org/CVERecord?id=CVE-2018-5710
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-5710.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-5710
Downstream
Published
2018-01-16T09:29:00.530Z
Modified
2026-05-18T05:50:30.517300978Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdbldap/ldapprincipal2.c in the Key Distribution Center (KDC), which allows remote authenticated users to cause a denial of service (NULL pointer dereference) via a modified kadmin client.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "5-1.16"
                }
            ],
            "vendor_product": "mit:kerberos"
        }
    ]
}
References

Affected packages

Git / github.com/krb5/krb5

Affected ranges

Type
GIT
Repo
https://github.com/krb5/krb5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "source": "DESCRIPTION",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.16"
        }
    ]
}

Affected versions

krb5-1.*
krb5-1.16-beta1
krb5-1.16-beta2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-5710.json"