Bug 1705877 (CVE-2018-16860)
Summary: | CVE-2018-16860 samba: S4U2Self with unkeyed checksum | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Huzaifa S. Sidhpurwala <huzaifas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abokovoy, abo, anoopcs, asn, bmcclain, dblechte, dfediuck, eedri, gdeschner, jarrpa, jblaine, jstephen, ktdreyer, lmohanty, madam, mgoldboi, michal.skrivanek, rhs-smb, sankarshan, sbonazzo, sbose, security-response-team, sherold, sisharma, smohan, ssaha, ssorce, vbellur, yozone, yturgema |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Samba 4.8.12, Samba 4.9.8, Samba 4.10.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in samba's Heimdal KDC implementation when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-05-14 09:43:06 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1709679, 1709680, 1709681 | ||
Bug Blocks: | 1705878 |
Description
Huzaifa S. Sidhpurwala
2019-05-03 06:11:06 UTC
Acknowledgments: Name: Isaac Boukris and Andrew Bartlett (Samba Team and Catalyst) Upstream bug: https://bugzilla.samba.org/show_bug.cgi?id=13685 Doing unembargo: This issue has been made public today(14/05/2019). https://www.samba.org/samba/history/security.html https://www.samba.org/samba/security/CVE-2018-16860.html Created heimdal tracking bugs for this issue: Affects: fedora-all [bug 1709680] Created samba tracking bugs for this issue: Affects: fedora-all [bug 1709679] Created heimdal tracking bugs for this issue: Affects: epel-all [bug 1709681] External References: https://www.samba.org/samba/security/CVE-2018-16860.html Hello - could someone explain why this is "NOTABUG" on RHEL and there is not a new Samba release being developed at RH to address this? There is no explanation in this ticket/issue or at any of the links in this ticket/issue. The official Red Hat statement (https://access.redhat.com/security/cve/cve-2018-16860) on this CVE is similarly vague and just says "RHEL 7 not affected". Our security compliance team requires more information from us, ideally, than "RH says its Samba is not affected. No reason why." I told them that RHEL Samba links to MIT Kerberos not Heimdal and that *might* be the reasoning for it not being a bug in RHEL, but admitted I was just guessing... Any further info would be very much appreciated. Jeff, we are not shipping a Heimdal KDC for or with Samba at all in any Red Hat product. We do build Samba's AD DC components only in Fedora and even there in Fedora we use a MIT Kerberos KDC, not the Heimdal KDC which is coming along with the Samba tarballs. Thus a flaw in the S4U2SELF implementation in a Heimdal KDC does not affect us at all. |