Vulnerability Details : CVE-2017-11103
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
Products affected by CVE-2017-11103
- cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*
Threat overview for CVE-2017-11103
Top countries where our scanners detected CVE-2017-11103
Top open port discovered on systems with this issue
445
IPs affected by CVE-2017-11103 216,909
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-11103!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-11103
2.92%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-11103
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2017-11103
-
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-11103
-
http://www.debian.org/security/2017/dsa-3912
Debian -- Security Information -- DSA-3912-1 heimdalThird Party Advisory
-
https://support.apple.com/HT208112
About the security content of iOS 11 - Apple SupportThird Party Advisory
-
http://www.securitytracker.com/id/1039427
Apple macOS/OS X Multiple Flaws Let Remote and Local Users Bypass Security and Deny Service, Local Users Obtain Potentially Sensitive Information, and Applications Gain Elevated Privileges - SecurityTThird Party Advisory;VDB Entry
-
https://www.samba.org/samba/security/CVE-2017-11103.html
Samba - Security Announcement ArchiveThird Party Advisory
-
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:05.heimdal.asc
Third Party Advisory
-
http://www.securitytracker.com/id/1038876
FreeBSD Heimdal Programming Error Lets Remote Users Bypass Kerberos Authentication in Certain Cases - SecurityTrackerThird Party Advisory;VDB Entry
-
https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
Release Heimdal 7.4 · heimdal/heimdal · GitHubRelease Notes
-
https://support.apple.com/HT208144
About the security content of macOS High Sierra 10.13 - Apple SupportThird Party Advisory
-
http://www.h5l.org/advisories.html?show=2017-07-11
Heimdal security advisoriesBroken Link
-
https://support.apple.com/HT208221
About the security content of macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan - Apple SupportThird Party Advisory
-
https://www.orpheus-lyre.info/
Orpheus' LyreThird Party Advisory
-
http://www.securityfocus.com/bid/99551
Heimdal CVE-2017-11103 Man in the Middle Security Bypass VulnerabilityThird Party Advisory;VDB Entry
Jump to