CVE-2018-16860

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-16860
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16860.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-16860
Downstream
Related
Published
2019-07-31T15:15:11Z
Modified
2025-09-30T07:31:21.771858Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.

References

Affected packages

Git / github.com/samba-team/samba

Affected ranges

Type
GIT
Repo
https://github.com/samba-team/samba
Events

Affected versions

ldb-1.*

ldb-1.3.3
ldb-1.3.4
ldb-1.3.5
ldb-1.3.6
ldb-1.3.7
ldb-1.3.8

samba-4.*

samba-4.8.0
samba-4.8.1
samba-4.8.10
samba-4.8.11
samba-4.8.2
samba-4.8.3
samba-4.8.4
samba-4.8.5
samba-4.8.6
samba-4.8.7
samba-4.8.8
samba-4.8.9