CVE-2017-11103

Source
https://cve.org/CVERecord?id=CVE-2017-11103
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-11103.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-11103
Downstream
Related
Published
2017-07-13T13:29:00.173Z
Modified
2026-02-06T22:40:08.358449Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In krb5extractticket() the KDC-REP service name must be obtained from the encrypted version stored in 'encpart' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.

References

Affected packages

Git / github.com/samba-team/samba

Affected versions

samba-4.*
samba-4.5.0
samba-4.5.1
samba-4.5.10
samba-4.5.11
samba-4.5.2
samba-4.5.3
samba-4.5.4
samba-4.5.5
samba-4.5.6
samba-4.5.7
samba-4.5.8
samba-4.5.9
samba-4.6.0
samba-4.6.1
samba-4.6.2
samba-4.6.3
samba-4.6.4
samba-4.6.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-11103.json"