Hide Forgot
As per upstream advisory: Samba as an Active Directory Domain Controller is based on Kerberos, which provides name-based authentication. These names are often then used for authorization. However Microsoft Windows and Active Direcory is SID-based. SIDs in Windows, similar to UIDs in Linux/Unix (if managed well) are globally unique and survive name changes. At the meeting of these two authorization schemes it is possible to confuse a server into acting as one user when holding a ticket for another. A Kerberos ticket, once issued, may be valid for some time, often 10 hours but potentially longer. In Active Directory, it may or may not carry a PAC, holding the user's SIDs. Delegated administrators with the right to create other user or machine accounts can abuse the race between the time of ticket issue and the time of presentation (back to the AD DC) to impersonate a different user.
Created freeipa tracking bugs for this issue: Affects: fedora-all [bug 2021720] Created samba tracking bugs for this issue: Affects: fedora-all [bug 2021719]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:5142 https://access.redhat.com/errata/RHSA-2021:5142
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:5195 https://access.redhat.com/errata/RHSA-2021:5195
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25719
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0007 https://access.redhat.com/errata/RHSA-2022:0007
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:0076 https://access.redhat.com/errata/RHSA-2022:0076