11 April,19 at 11:50 AM
Product:
Centrify Server Suite
Component:
Centrify DirectControl
Summary:
Question:
What is the impact of vulnerability alerts reported in CVE-2017-11103 to Centrify DirectControl?e?
Answer:
CVE-2017-11103 reports vulnerability with Kerberized application built using Heimdal version prior to 7.4.
Heimdal version prior to 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks.
NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
Centrify DirectControl ported KCM does not make use of any code from Heimdal to process Kerberos ticket, credential, and principal. Any API used by Centrify DirectControl that requires to process Kerberos ticket, credential, and principal uses MIT krb5 API hence is not affected by CVE-2017-11103.
For more information, please see KB-8962 or contact Centrify Support.