English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.704345
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 4345-1 (samba - security update)
Summary:Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,;print, and login server for Unix. The Common Vulnerabilities and;Exposures project identifies the following issues:;;CVE-2018-14629 ;Florian Stuelpner discovered that Samba is vulnerable to;infinite query recursion caused by CNAME loops, resulting in;denial of service.;;https://www.samba.org/samba/security/CVE-2018-14629.htmlCVE-2018-16841 ;Alex MacCuish discovered that a user with a valid certificate or;smart card can crash the Samba AD DC's KDC when configured to accept;smart-card authentication.;;https://www.samba.org/samba/security/CVE-2018-16841.htmlCVE-2018-16851 ;Garming Sam of the Samba Team and Catalyst discovered a NULL pointer;dereference vulnerability in the Samba AD DC LDAP server allowing a;user able to read more than 256MB of LDAP entries to crash the Samba;AD DC's LDAP server.;;https://www.samba.org/samba/security/CVE-2018-16851.html
Description:Summary:
Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2018-14629
Florian Stuelpner discovered that Samba is vulnerable to
infinite query recursion caused by CNAME loops, resulting in
denial of service.

https://www.samba.org/samba/security/CVE-2018-14629.htmlCVE-2018-16841
Alex MacCuish discovered that a user with a valid certificate or
smart card can crash the Samba AD DC's KDC when configured to accept
smart-card authentication.

https://www.samba.org/samba/security/CVE-2018-16841.htmlCVE-2018-16851
Garming Sam of the Samba Team and Catalyst discovered a NULL pointer
dereference vulnerability in the Samba AD DC LDAP server allowing a
user able to read more than 256MB of LDAP entries to crash the Samba
AD DC's LDAP server.

https://www.samba.org/samba/security/CVE-2018-16851.html

Vulnerability Insight:
Samba is an implementation of the SMB/CIFS protocol for Unix systems,
providing support for cross-platform file and printer sharing with
Microsoft Windows, OS X, and other Unix systems. Samba can also function
as an NT4-style domain controller, and can integrate with both NT4 domains
and Active Directory realms as a member server.

Affected Software/OS:
samba on Debian Linux

Solution:
For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u4.

We recommend that you upgrade your samba packages.

For the detailed security status of samba please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/samba

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-14629
Common Vulnerability Exposure (CVE) ID: CVE-2018-16841
Common Vulnerability Exposure (CVE) ID: CVE-2018-16851
CopyrightCopyright (c) 2018 Greenbone Networks GmbH http://greenbone.net

This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.