All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Samba | Samba | 4.0.0 (including) | 4.9.17 (excluding) |
Samba | Samba | 4.10.0 (including) | 4.10.11 (excluding) |
Samba | Samba | 4.11.0 (including) | 4.11.3 (excluding) |
Samba | Ubuntu | bionic | * |
Samba | Ubuntu | devel | * |
Samba | Ubuntu | disco | * |
Samba | Ubuntu | eoan | * |
Samba | Ubuntu | trusty | * |
Samba | Ubuntu | trusty/esm | * |
Samba | Ubuntu | upstream | * |
Samba | Ubuntu | xenial | * |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.