Security Vulnerability: Zerologon aka CVE-2020-1472
This document (000019713) is provided subject to the disclaimer at the end of this document.
SUSE Linux Enterprise Server 12
As this is a protocol design flaw inside the cryptographic authentication method, the issue is present in Samba.
Every Samba administrator should check the server settings for 'server schannel' values.
Please note the following settings are NOT secure and could lead to a fully compromised domain controller :
server schannel = no server schannel = auto
Please use the setting below as current mitigation :
server schannel = yes
As per September 23, 2020. SUSE has released updates for all effected code streams.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000019713
- Creation Date: 25-Sep-2020
- Modified Date:25-Sep-2020
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com