Name | CVE-2017-11103 |
Description | Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1027-1, DSA-3909-1, DSA-3912-1 |
Debian Bugs | 868208, 868209 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
heimdal (PTS) | bullseye (security), bullseye | 7.7.0+dfsg-2+deb11u3 | fixed |
| bookworm | 7.8.git20221117.28daf24+dfsg-2 | fixed |
| sid, trixie | 7.8.git20221117.28daf24+dfsg-8 | fixed |
samba (PTS) | bullseye (security), bullseye | 2:4.13.13+dfsg-1~deb11u6 | fixed |
| bookworm, bookworm (security) | 2:4.17.12+dfsg-0+deb12u1 | fixed |
| sid, trixie | 2:4.21.1+dfsg-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[wheezy] - samba <not-affected> (Heimdal is only used in 4.x, wheezy ships 3.6.6)
[wheezy] - samba4 <not-affected> (dynamically linked against system heimdal)
https://orpheus-lyre.info/
https://github.com/heimdal/heimdal/commit/6dd3eb836bbb80a00ffced4ad57077a1cdf227ea
samba's source package embeds heimdal but the binary is statically linked to src:heimdal
https://www.samba.org/samba/security/CVE-2017-11103.html
Upstream Samba Bug: https://bugzilla.samba.org/show_bug.cgi?id=12894