Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-16860 |
CWE-ID | CWE-287 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
samba (Alpine package) Operating systems & Components / Operating system package or component RoboHelp Universal components / Libraries / Software for developers |
Vendor |
Alpine Linux Development Team Adobe |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU18438
Risk: Medium
CVSSv4.0: 5.2 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-16860
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated user to compromise vulnerable domain.
The vulnerability exists due to an error within the process of obtaining kerberos ticket for a service from the Kerberos Key Distribution Center (KDC) that involves S4U2Self and S4U2Proxy extensions. A remote authenticated user can impersonate another service on the network and obtain elevated privileges within the domain.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable Active Directory implementation.
Install update from vendor's website.
Vulnerable software versionssamba (Alpine package): 4.1.1-r0 - 4.8.11-r1
RoboHelp: 0.60.6-r0
CPE2.3https://git.alpinelinux.org/aports/commit/?id=7f6e6b03d2536a389bb79a29915bd3a8fe881517
https://git.alpinelinux.org/aports/commit/?id=a80d49fcecdaa5350d709fc4e9b5d71716661eb7
https://git.alpinelinux.org/aports/commit/?id=bcc49b4c70d8234ad73c32628b01f58554ec5b5e
https://git.alpinelinux.org/aports/commit/?id=358e0341238ac9f457328893b2974e256e37693f
https://git.alpinelinux.org/aports/commit/?id=62d88ba3b7c2ed610aaf68d2a5a5956f6e702708
https://git.alpinelinux.org/aports/commit/?id=e6b1fa7dad551ad0f3cbb54319d7b8d38ed40ddb
https://git.alpinelinux.org/aports/commit/?id=5ee28b356b1b4aebf9d9fafa32c82c7519cbecd9
https://git.alpinelinux.org/aports/commit/?id=aa2d24fab1e16e497512004aa40a11c032fcab73
https://git.alpinelinux.org/aports/commit/?id=d3d301001ca95af4473c3a52c9bccd9950b7b04c
https://git.alpinelinux.org/aports/commit/?id=d7f01c593b1ee60783bd9bf1b13f1ef234896a10
https://git.alpinelinux.org/aports/commit/?id=47edd290d1ad530be52e98617325c29417d47cf1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.