{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-14870", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Red Hat", "product": { "product_data": [ { "product_name": "samba", "version": { "version_data": [ { "version_value": "all versions 4.11.x before 4.11.3" }, { "version_value": "all versions 4.10.x before 4.10.11" }, { "version_value": "all versions 4.x.x before 4.9.17" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870", "refsource": "CONFIRM" }, { "refsource": "UBUNTU", "name": "USN-4217-1", "url": "https://usn.ubuntu.com/4217-1/" }, { "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20191210-0002/", "url": "https://security.netapp.com/advisory/ntap-20191210-0002/" }, { "refsource": "CONFIRM", "name": "https://www.samba.org/samba/security/CVE-2019-14870.html", "url": "https://www.samba.org/samba/security/CVE-2019-14870.html" }, { "refsource": "UBUNTU", "name": "USN-4217-2", "url": "https://usn.ubuntu.com/4217-2/" }, { "refsource": "FEDORA", "name": "FEDORA-2019-be98a08835", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/" }, { "refsource": "CONFIRM", "name": "https://www.synology.com/security/advisory/Synology_SA_19_40", "url": "https://www.synology.com/security/advisory/Synology_SA_19_40" }, { "refsource": "SUSE", "name": "openSUSE-SU-2019:2700", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html" }, { "refsource": "FEDORA", "name": "FEDORA-2019-11dddb785b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/" }, { "refsource": "GENTOO", "name": "GLSA-202003-52", "url": "https://security.gentoo.org/glsa/202003-52" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ] ] } }