A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.
Link | Tags |
---|---|
https://www.synology.com/security/advisory/Synology_SA_19_23 | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860 | third party advisory issue tracking |
https://www.samba.org/samba/security/CVE-2018-16860.html | mitigation vendor advisory |
https://seclists.org/bugtraq/2019/Aug/25 | mailing list |
https://seclists.org/bugtraq/2019/Aug/22 | mailing list |
https://seclists.org/bugtraq/2019/Aug/23 | mailing list |
https://seclists.org/bugtraq/2019/Aug/21 | mailing list |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html | vendor advisory |
http://seclists.org/fulldisclosure/2019/Aug/14 | mailing list |
http://seclists.org/fulldisclosure/2019/Aug/11 | mailing list |
http://seclists.org/fulldisclosure/2019/Aug/13 | mailing list |
http://seclists.org/fulldisclosure/2019/Aug/15 | mailing list |
https://support.apple.com/HT210346 | |
https://support.apple.com/HT210348 | |
https://support.apple.com/HT210351 | |
https://support.apple.com/HT210353 | |
https://security.gentoo.org/glsa/202003-52 | vendor advisory |