CVE-2017-11103
Description
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
Affected products
8cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- www.debian.org/security/2017/dsa-3912nvdThird Party Advisory
- www.securityfocus.com/bid/99551nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1038876nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039427nvdThird Party AdvisoryVDB Entry
- support.apple.com/HT208112nvdThird Party Advisory
- support.apple.com/HT208144nvdThird Party Advisory
- support.apple.com/HT208221nvdThird Party Advisory
- www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.ascnvdThird Party Advisory
- www.orpheus-lyre.infonvdThird Party Advisory
- www.samba.org/samba/security/CVE-2017-11103.htmlnvdThird Party Advisory
- www.h5l.org/advisories.htmlnvdBroken Link
- github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0nvdRelease Notes
News mentions
0No linked articles in our index yet.