Описание
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 7.5.0+dfsg-1ubuntu0.1 |
cosmic | ignored | end of life |
devel | not-affected | 7.5.0+dfsg-3build1 |
disco | ignored | end of life |
eoan | not-affected | 7.5.0+dfsg-3build1 |
esm-apps/jammy | not-affected | 7.5.0+dfsg-3build1 |
esm-infra-legacy/trusty | not-affected | 1.6~git20131207+dfsg-1ubuntu1.2+esm1 |
esm-infra/bionic | not-affected | 7.5.0+dfsg-1ubuntu0.1 |
esm-infra/focal | not-affected | 7.5.0+dfsg-3build1 |
esm-infra/xenial | released | 1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2:4.7.6+dfsg~ubuntu-0ubuntu2.10 |
cosmic | released | 2:4.8.4+dfsg-2ubuntu2.4 |
devel | released | 2:4.10.0+dfsg-0ubuntu2.1 |
disco | released | 2:4.10.0+dfsg-0ubuntu2.1 |
esm-infra-legacy/trusty | not-affected | 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm1 |
esm-infra/bionic | not-affected | 2:4.7.6+dfsg~ubuntu-0ubuntu2.10 |
esm-infra/focal | not-affected | 2:4.10.0+dfsg-0ubuntu2.1 |
esm-infra/xenial | not-affected | 2:4.3.11+dfsg-0ubuntu0.16.04.20 |
focal | released | 2:4.10.0+dfsg-0ubuntu2.1 |
jammy | released | 2:4.10.0+dfsg-0ubuntu2.1 |
Показывать по
6 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x ...
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
Уязвимость реализации Heimdal протокола Kerberos пакета программ сетевого взаимодействия Samba, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
6 Medium
CVSS2
7.5 High
CVSS3