Security Vulnerability: Zerologon aka CVE-2020-1472
This document (000019713) is provided subject to the disclaimer at the end of this document.
Environment
SUSE Linux Enterprise Server 12
Situation
As this is a protocol design flaw inside the cryptographic authentication method, the issue is present in Samba.
Resolution
Mitigations:
Every Samba administrator should check the server settings for 'server schannel' values.
Please note the following settings are NOT secure and could lead to a fully compromised domain controller :
server schannel = no server schannel = auto
Please use the setting below as current mitigation :
server schannel = yes
As per September 23, 2020. SUSE has released updates for all effected code streams.
Cause
Status
Additional Information
Disclaimer
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000019713
- Creation Date: 16-Sep-2020
- Modified Date:25-Sep-2020
-
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com