First published: Wed Nov 03 2021(Updated: )
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <4.15.2 | 4.15.2 |
redhat/samba | <4.14.10 | 4.14.10 |
redhat/samba | <4.13.14 | 4.13.14 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.1+dfsg-2 | |
Samba | >=4.0.0<4.13.14 | |
Samba | >=4.14.0<4.14.10 | |
Samba | >=4.15.0<4.15.2 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Ubuntu Linux | =20.04 | |
Ubuntu Linux | =21.04 | |
Ubuntu Linux | =21.10 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux for ibm z systems | =7.0 | |
redhat enterprise Linux for ibm z systems | =8.0 | |
redhat enterprise Linux for ibm z systems eus | =8.2 | |
redhat enterprise Linux for ibm z systems eus | =8.4 | |
redhat enterprise Linux for power big endian | =7.0 | |
redhat enterprise Linux for power little endian | =7.0 | |
redhat enterprise Linux for power little endian | =8.0 | |
redhat enterprise Linux for power little endian eus | =8.2 | |
redhat enterprise Linux for power little endian eus | =8.4 | |
redhat enterprise Linux for scientific computing | =7.0 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server update services for sap solutions | =8.2 | |
redhat enterprise Linux server update services for sap solutions | =8.4 | |
redhat enterprise Linux workstation | =7.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =33 | |
Fedora | =34 | |
Fedora | =35 | |
Ubuntu | =20.04 | |
Ubuntu | =21.04 | |
Ubuntu | =21.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25719 is a vulnerability in Samba that affects the way it implements Kerberos name-based authentication.
CVE-2020-25719 could cause the Samba AD DC to become confused about the user a ticket represents if it does not strictly require a Kerberos PAC.
The severity of CVE-2020-25719 is critical, with a severity value of 7.2.
CVE-2020-25719 affects Samba versions 4.0.0 to 4.13.14, 4.14.0 to 4.14.10, and 4.15.0 to 4.15.2.
To fix CVE-2020-25719 in Samba, update to version 4.13.14, 4.14.10, or 4.15.2.