Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-11103


Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.


Published

2017-07-13T13:29:00.173

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-345

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application heimdal_project heimdal < 7.4.0 Yes
Operating System freebsd freebsd - Yes
Application samba samba < 4.4.15 Yes
Application samba samba < 4.5.12 Yes
Application samba samba < 4.6.6 Yes
Operating System apple iphone_os < 11.0 Yes
Operating System apple mac_os_x < 10.13.1 Yes
Operating System debian debian_linux 8.0 Yes
Operating System debian debian_linux 9.0 Yes
Operating System debian debian_linux 10.0 Yes

References