发布时间: 2022年8月5日
修改时间: 2024年10月31日
As per samba upstream advisory:All versions of Samba prior to 4.16.x built with Heimdal Kerberos are vulnerable to an Elevation of Privilege attack. If the password of a user expires and need to be changed, a user could get a krbtgt using kpasswd with canonicalization turned on. The KDC should only provide a ticket for kadmin/changepw but returns a krbtgt. So a user could skip the password change and just use the krbtgt to get service tickets and use services in the forest.
NVD | openEuler | |
---|---|---|
Confidentiality | High | Low |
Attack Vector | Network | Network |
CVSS评分 | 8.8 | 5.4 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | High | Low |
User Interaction | None | None |
Availability | High | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1925 | samba security update | 2022年8月5日 |
KylinSec-SA-2022-1947 | samba security update | 2022年8月11日 |
KylinSec-SA-2022-1948 | samba security update | 2022年8月11日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | samba | Fixed |
KY3.4-5 | samba | Fixed |
KY3.5.1 | samba | Fixed |