First published: Wed Nov 03 2021(Updated: )
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.0.0<4.13.14 | |
Samba Samba | >=4.14.0<4.14.10 | |
Samba Samba | >=4.15.0<4.15.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =21.04 | |
Canonical Ubuntu Linux | =21.10 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux For Ibm Z Systems | =7.0 | |
Redhat Enterprise Linux For Ibm Z Systems | =8.0 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.2 | |
Redhat Enterprise Linux For Ibm Z Systems Eus | =8.4 | |
Redhat Enterprise Linux For Power Big Endian | =7.0 | |
Redhat Enterprise Linux For Power Little Endian | =7.0 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.2 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.4 | |
Redhat Enterprise Linux For Scientific Computing | =7.0 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.2 | |
Redhat Enterprise Linux Server Update Services For Sap Solutions | =8.4 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/samba | <4.15.2 | 4.15.2 |
redhat/samba | <4.14.10 | 4.14.10 |
redhat/samba | <4.13.14 | 4.13.14 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.1+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25719 is a vulnerability in Samba that affects the way it implements Kerberos name-based authentication.
CVE-2020-25719 could cause the Samba AD DC to become confused about the user a ticket represents if it does not strictly require a Kerberos PAC.
The severity of CVE-2020-25719 is critical, with a severity value of 7.2.
CVE-2020-25719 affects Samba versions 4.0.0 to 4.13.14, 4.14.0 to 4.14.10, and 4.15.0 to 4.15.2.
To fix CVE-2020-25719 in Samba, update to version 4.13.14, 4.14.10, or 4.15.2.