Bug 2154303 (CVE-2022-37966) - CVE-2022-37966 samba: Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability.
Summary: CVE-2022-37966 samba: Windows Kerberos RC4-HMAC Elevation of Privilege Vulner...
Alias: CVE-2022-37966
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 2154304 Red Hat2154306 Red Hat2154307 Red Hat2154309 Red Hat2154310 Red Hat2154311 Red Hat2154312 Red Hat2154313 Red Hat2154314 Red Hat2154315 Red Hat2154316
Blocks: Embargoed2154280
TreeView+ depends on / blocked
Reported: 2022-12-16 15:16 UTC by Marco Benatto
Modified: 2023-02-27 14:48 UTC (History)
8 users (show)

Fixed In Version: samba 4.15.13, samba 4.16.8, samba 4.15.13
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2022-12-16 18:31:29 UTC

Attachments (Terms of Use)

Description Marco Benatto 2022-12-16 15:16:01 UTC
A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.

Comment 1 Marco Benatto 2022-12-16 15:16:41 UTC
Created samba tracking bugs for this issue:

Affects: fedora-all [bug 2154304]

Note You need to log in before you can comment on or make changes to this bug.