Bug 2154303 (CVE-2022-37966) - CVE-2022-37966 samba: Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability.
Summary: CVE-2022-37966 samba: Windows Kerberos RC4-HMAC Elevation of Privilege Vulner...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-37966
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2154304 2154306 2154307 2154309 2154310 2154311 2154312 2154313 2154314 2154315 2154316
Blocks: 2154280
TreeView+ depends on / blocked
 
Reported: 2022-12-16 15:16 UTC by Marco Benatto
Modified: 2023-02-27 14:48 UTC (History)
8 users (show)

Fixed In Version: samba 4.15.13, samba 4.16.8, samba 4.15.13
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-12-16 18:31:29 UTC
Embargoed:


Attachments (Terms of Use)

Description Marco Benatto 2022-12-16 15:16:01 UTC
A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.

Comment 1 Marco Benatto 2022-12-16 15:16:41 UTC
Created samba tracking bugs for this issue:

Affects: fedora-all [bug 2154304]


Note You need to log in before you can comment on or make changes to this bug.