Synology-SA-19:23 Samba AD DC
Publish Time: 2019-05-15 16:06:59 UTC+8
Last Updated: 2019-12-17 15:17:02 UTC+8
- Severity
- Important
- Status
- Resolved
Abstract
CVE-2018-16860 allows man-in-the-middle attackers to bypass security constraints via a susceptible version of Directory Server for Windows Domain.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
Directory Server for Windows Domain | Important | Upgrade to 6.2.2-24922-1 or above. |
Mitigation
None
Detail
- CVE-2018-16860
- Severity: Important
- CVSS3 Base Score: 8.5
- CVSS3 Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
- A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
Reference
- Samba Releases Security Updates
- Samba - Security Announcement Archive - CVE-2018-16860
- CVE-2018-16860
Revision
Revision | Date | Description |
---|---|---|
1 | 2019-05-15 | Initial public release. |
2 | 2019-06-11 | Update for Directory Server for Windows Domain is now available in Affected Products. |
3 | 2019-12-17 | Disclosed vulnerability details. |