Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2018-16860

Published: 14 May 2019

A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
upstream Needs triage

xenial
Released (2:4.3.11+dfsg-0ubuntu0.16.04.20)
bionic
Released (2:4.7.6+dfsg~ubuntu-0ubuntu2.10)
cosmic
Released (2:4.8.4+dfsg-2ubuntu2.4)
disco
Released (2:4.10.0+dfsg-0ubuntu2.1)
focal
Released (2:4.10.0+dfsg-0ubuntu2.1)
jammy
Released (2:4.10.0+dfsg-0ubuntu2.1)
kinetic
Released (2:4.10.0+dfsg-0ubuntu2.1)
heimdal
Launchpad, Ubuntu, Debian
cosmic Ignored
(end of life)
bionic
Released (7.5.0+dfsg-1ubuntu0.1)
kinetic Not vulnerable
(7.5.0+dfsg-3build1)
disco Ignored
(end of life)
eoan Not vulnerable
(7.5.0+dfsg-3build1)
focal Not vulnerable
(7.5.0+dfsg-3build1)
groovy Not vulnerable
(7.5.0+dfsg-3build1)
hirsute Not vulnerable
(7.5.0+dfsg-3build1)
impish Not vulnerable
(7.5.0+dfsg-3build1)
jammy Not vulnerable
(7.5.0+dfsg-3build1)
trusty
Released (1.6~git20131207+dfsg-1ubuntu1.2+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream
Released (7.6, 7.5.0+dfsg-3, 7.1.0+dfsg-13+deb9u3)
xenial
Released (1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
Patches:
upstream: https://github.com/heimdal/heimdal/commit/c6257cc2c842c0faaeb4ef34e33890ee88c4cbba

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity High
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H