Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-14870

Опубликовано: 10 дек. 2019
Источник: debian
EPSS Низкий

Описание

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sambafixed2:4.11.3+dfsg-1package
sambaignoredbusterpackage
sambano-dsajessiepackage
heimdalfixed7.7.0+dfsg-1package
heimdalno-dsastretchpackage
heimdalno-dsajessiepackage

Примечания

  • https://www.samba.org/samba/security/CVE-2019-14870.html

  • https://github.com/heimdal/heimdal/security/advisories/GHSA-q77c-9qvp-qfw4

  • https://github.com/heimdal/heimdal/pull/663

  • https://github.com/heimdal/heimdal/pull/664 (port to 7.1 branch)

  • https://github.com/heimdal/heimdal/commit/0495a19a938ad68283078e62c659e4f1c5980815 (heimdal-7.7.1)

  • https://github.com/heimdal/heimdal/commit/bdd1d0227720c252771f2db65c31f02bc9fc493c (heimdal-7.7.1)

  • https://github.com/heimdal/heimdal/commit/fd43016f2f4b58cf4f0cf3f47b2541f2ab11b2b8 (heimdal-7.7.1)

EPSS

Процентиль: 89%
0.04669
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
около 6 лет назад

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.

CVSS3: 5.4
redhat
около 6 лет назад

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.

CVSS3: 5.4
nvd
около 6 лет назад

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.

CVSS3: 5.4
github
больше 3 лет назад

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.

CVSS3: 5.4
fstec
около 6 лет назад

Уязвимость пакета программ сетевого взаимодействия Samba, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

EPSS

Процентиль: 89%
0.04669
Низкий