5.9
CVSSv3

CVE-2018-16853

Published: 28/11/2018 Updated: 09/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

samba samba

Vendor Advisories

Samba versions 47 and later, built with MIT Kerberos support, are vulnerable to a crash via the S4U2self extension A user in a Samba Active Directory domain can crash the KDC when Samba is built in the non-default MIT Kerberos configuration ...
A denial of service has been found in samba from 470 up to and including 492, where a user in a Samba AD domain can crash the MIT KDC by requesting an S4U2Self ticket This only happens if Samba is build in a experimental and unsupported MIT Kerberos configuration ...