Executive Summary
Summary | |
---|---|
Title | samba security update |
Informations | |||
---|---|---|---|
Name | DSA-4345 | First vendor Publication | 2018-11-27 |
Vendor | Debian | Last vendor Modification | 2018-11-27 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 4 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2018-14629 Florian Stuelpner discovered that Samba is vulnerable to infinite query recursion caused by CNAME loops, resulting in denial of service. https://www.samba.org/samba/security/CVE-2018-14629.html CVE-2018-16841 Alex MacCuish discovered that a user with a valid certificate or smart card can crash the Samba AD DC's KDC when configured to accept smart-card authentication. https://www.samba.org/samba/security/CVE-2018-16841.html CVE-2018-16851 Garming Sam of the Samba Team and Catalyst discovered a NULL pointer dereference vulnerability in the Samba AD DC LDAP server allowing a user able to read more than 256MB of LDAP entries to crash the Samba AD DC's LDAP server. https://www.samba.org/samba/security/CVE-2018-16851.html For the stable distribution (stretch), these problems have been fixed in version 2:4.5.12+dfsg-2+deb9u4. We recommend that you upgrade your samba packages. For the detailed security status of samba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/samba |
Original Source
Url : http://www.debian.org/security/2018/dsa-4345 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-476 | NULL Pointer Dereference |
50 % | CWE-415 | Double Free |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-c2a93f8e1b.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-e423e8743f.nasl - Type : ACT_GATHER_INFO |
2018-12-17 | Name : The remote Debian host is missing a security update. File : debian_DLA-1607.nasl - Type : ACT_GATHER_INFO |
2018-11-29 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2018-333-01.nasl - Type : ACT_GATHER_INFO |
2018-11-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4345.nasl - Type : ACT_GATHER_INFO |
2018-11-28 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_54976998f24811e881e2005056a311d1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2019-02-01 09:21:20 |
|
2018-11-29 17:21:41 |
|
2018-11-27 13:19:38 |
|