Vulnerability & Exploit Database

Displaying entries 1 - 10 of 12 in total

Results for: CVE-2017-11103 Back to search

Samba CVE-2017-11103: Orpheus' Lyre mutual authentication validation bypass. Vulnerability

  • Severity: 7
  • Published: July 13, 2017

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypt...

OS X update for Heimdal (CVE-2017-11103) Vulnerability

  • Severity: 7
  • Published: July 13, 2017

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypt...

Alpine Linux: CVE-2017-11103: heimdal Orpheus' Lyre KDC-REP service name validation Vulnerability

  • Severity: 7
  • Published: July 13, 2017

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypt...

Ubuntu: (Multiple Advisories) (CVE-2017-11103): Samba vulnerability Vulnerability

  • Severity: 7
  • Published: July 12, 2017

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypt...

SUSE: CVE-2017-11103: SUSE Linux Security Advisory Vulnerability

  • Severity: 7
  • Published: July 12, 2017

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypt...

FreeBSD: VID-85851E4F-67D9-11E7-BC37-00505689D4AE (CVE-2017-11103): samba -- Orpheus Lyre mutual authentication validation bypass Vulnerability

  • Severity: 7
  • Published: July 12, 2017

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypt...

Debian: CVE-2017-11103: heimdal -- security update Vulnerability

  • Severity: 7
  • Published: July 12, 2017

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypt...

Vulnerabilities deemed not relevant on Red Hat Enterprise Linux 7 Vulnerability

  • Severity: 1
  • Published: June 10, 2014

This is a placeholder for all CVEs that are not relevant for one reason or another on Red Hat Enterprise Linux 7. Oftentimes Red Hat makes this determination because the affected software was shipped, built or configured in a manner that it made it invulnerable to a given vulnerability.

Vulnerabilities deemed not relevant on Red Hat Enterprise Linux 6 Vulnerability

  • Severity: 1
  • Published: November 10, 2010

This is a placeholder for all CVEs that are not relevant for one reason or another on Red Hat Enterprise Linux 6. Oftentimes Red Hat makes this determination because the affected software was shipped, built or configured in a manner that it made it invulnerable to a given vulnerability.

Sun Patch: SunOS 5.10_x86: Samba patch Vulnerability

  • Severity: 10
  • Published: May 14, 2007

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.