Published: 06 March 2018

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.

From the Ubuntu security team

It was discovered that Kerberos incorrectly handled certain database arguments. A remote authenticated attacker could possibly use this issue to obtain sensitive information.



CVSS 3 base score: 3.8


Package Release Status
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.16-2ubuntu0.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1.13.2+dfsg-5ubuntu2.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.12+dfsg-2ubuntu5.4)
Binaries built from this source package are in Universe and so are supported by the community.