CVE-2017-11103
Published: 13 July 2017
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
Priority
CVSS 3 base score: 8.1
Status
Package | Release | Status |
---|---|---|
heimdal Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.7~git20150920+dfsg-4ubuntu1.16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(1.6~git20131207+dfsg-1ubuntu1.2)
|
|
samba Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(2:4.3.11+dfsg-0ubuntu0.16.04.9)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(2:4.3.11+dfsg-0ubuntu0.14.04.10)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
- https://orpheus-lyre.info/
- https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
- https://www.samba.org/samba/security/CVE-2017-11103.html
- http://www.h5l.org/advisories.html?show=2017-07-11
- https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
- https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
- https://www.orpheus-lyre.info/
- https://usn.ubuntu.com/usn/usn-3353-2
- https://usn.ubuntu.com/usn/usn-3353-1
- https://usn.ubuntu.com/usn/usn-3353-3
- https://usn.ubuntu.com/usn/usn-3353-4
- NVD
- Launchpad
- Debian