A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1788-1 | samba security update |
Debian DSA |
DSA-4443-1 | samba security update |
Debian DSA |
DSA-4455-1 | heimdal security update |
EUVD |
EUVD-2018-8651 | A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal. |
Ubuntu USN |
USN-3976-1 | Samba vulnerability |
Ubuntu USN |
USN-3976-2 | Samba vulnerability |
Ubuntu USN |
USN-5675-1 | Heimdal vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T10:32:54.113Z
Reserved: 2018-09-11T00:00:00
Link: CVE-2018-16860
No data.
Status : Modified
Published: 2019-07-31T15:15:11.687
Modified: 2024-11-21T03:53:28.003
Link: CVE-2018-16860
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN