CVE-2018-16860
Publication date 14 May 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
Status
Package | Ubuntu Release | Status |
---|---|---|
heimdal | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Fixed 7.5.0+dfsg-1ubuntu0.1
|
|
16.04 LTS xenial |
Fixed 1.7~git20150920+dfsg-4ubuntu1.16.04.1+esm1
|
|
14.04 LTS trusty |
Fixed 1.6~git20131207+dfsg-1ubuntu1.2+esm1
|
|
samba | ||
22.04 LTS jammy |
Fixed 2:4.10.0+dfsg-0ubuntu2.1
|
|
20.04 LTS focal |
Fixed 2:4.10.0+dfsg-0ubuntu2.1
|
|
18.04 LTS bionic |
Fixed 2:4.7.6+dfsg~ubuntu-0ubuntu2.10
|
|
16.04 LTS xenial |
Fixed 2:4.3.11+dfsg-0ubuntu0.16.04.20
|
|
14.04 LTS trusty |
Fixed 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3976-1
- Samba vulnerability
- 14 May 2019
- USN-3976-2
- Samba vulnerability
- 14 May 2019
- USN-5675-1
- Heimdal vulnerabilities
- 13 October 2022