Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-16860 |
CWE-ID | CWE-287 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
samba (Debian package) Operating systems & Components / Operating system package or component |
Vendor | Debian |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU18438
Risk: Medium
CVSSv4.0: 5.2 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-16860
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated user to compromise vulnerable domain.
The vulnerability exists due to an error within the process of obtaining kerberos ticket for a service from the Kerberos Key Distribution Center (KDC) that involves S4U2Self and S4U2Proxy extensions. A remote authenticated user can impersonate another service on the network and obtain elevated privileges within the domain.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable Active Directory implementation.
Update samba package to version 2:4.5.16+dfsg-1+deb9u2.
Vulnerable software versionssamba (Debian package): 2:4.5.16+dfsg-1+deb9u1
CPE2.3 External linkshttps://www.debian.org/security/2019/dsa-4443
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.