Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2018-5730 CVE-2018-5729 |
CWE-ID | CWE-264 CWE-476 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU11076
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-5730
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to bypass security restrictions on a targeted system.
The weakness exists due to insufficient security restrictions. A remote attacker can add crafted principals to the Lightweight Directory Access Protocol (LDAP) database and bypass a DN containership check.
Update the affected packages.
i686:Vulnerable software versions
krb5-devel-1.15.1-34.44.amzn1.i686
krb5-workstation-1.15.1-34.44.amzn1.i686
krb5-pkinit-openssl-1.15.1-34.44.amzn1.i686
krb5-server-1.15.1-34.44.amzn1.i686
krb5-server-ldap-1.15.1-34.44.amzn1.i686
libkadm5-1.15.1-34.44.amzn1.i686
krb5-libs-1.15.1-34.44.amzn1.i686
krb5-debuginfo-1.15.1-34.44.amzn1.i686
src:
krb5-1.15.1-34.44.amzn1.src
x86_64:
krb5-server-ldap-1.15.1-34.44.amzn1.x86_64
krb5-devel-1.15.1-34.44.amzn1.x86_64
krb5-debuginfo-1.15.1-34.44.amzn1.x86_64
krb5-workstation-1.15.1-34.44.amzn1.x86_64
libkadm5-1.15.1-34.44.amzn1.x86_64
krb5-libs-1.15.1-34.44.amzn1.x86_64
krb5-server-1.15.1-34.44.amzn1.x86_64
krb5-pkinit-openssl-1.15.1-34.44.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1129.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11080
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-5729
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to NULL pointer dereference. A local attacker can add crafted principals to the Lightweight Directory Access Protocol (LDAP) database and cause the service to crash.
Update the affected packages.
i686:Vulnerable software versions
krb5-devel-1.15.1-34.44.amzn1.i686
krb5-workstation-1.15.1-34.44.amzn1.i686
krb5-pkinit-openssl-1.15.1-34.44.amzn1.i686
krb5-server-1.15.1-34.44.amzn1.i686
krb5-server-ldap-1.15.1-34.44.amzn1.i686
libkadm5-1.15.1-34.44.amzn1.i686
krb5-libs-1.15.1-34.44.amzn1.i686
krb5-debuginfo-1.15.1-34.44.amzn1.i686
src:
krb5-1.15.1-34.44.amzn1.src
x86_64:
krb5-server-ldap-1.15.1-34.44.amzn1.x86_64
krb5-devel-1.15.1-34.44.amzn1.x86_64
krb5-debuginfo-1.15.1-34.44.amzn1.x86_64
krb5-workstation-1.15.1-34.44.amzn1.x86_64
libkadm5-1.15.1-34.44.amzn1.x86_64
krb5-libs-1.15.1-34.44.amzn1.x86_64
krb5-server-1.15.1-34.44.amzn1.x86_64
krb5-pkinit-openssl-1.15.1-34.44.amzn1.x86_64
Amazon Linux AMI: All versions
CPE2.3 External linkshttps://alas.aws.amazon.com/ALAS-2018-1129.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.