Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >

Does CVE-2017-11103 affect Centrify DirectControl?

11 April,19 at 11:50 AM


Centrify Server Suite 



Centrify DirectControl




What is the impact of vulnerability alerts reported in CVE-2017-11103 to Centrify DirectControl?e?

CVE-2017-11103 reports vulnerability with Kerberized application built using Heimdal version prior to 7.4.  

Heimdal version prior to 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. 

NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.

Centrify DirectControl ported KCM does not make use of any code from Heimdal to process Kerberos ticket, credential, and principal.  Any API used by Centrify DirectControl that requires to process Kerberos ticket, credential, and principal uses MIT krb5 API hence is not affected by CVE-2017-11103.


For more information, please see KB-8962 or contact Centrify Support.