First published: Wed Sep 13 2017(Updated: )
All versions of Samba are vulnerable to a server memory information leak bug over SMB1 if a client can write data to a share. Some SMB1 write requests were not correctly range checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client supplied data. The client cannot control the area of the server memory that is written to the file (or printer).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/samba | 2:4.9.5+dfsg-5+deb10u3 2:4.9.5+dfsg-5+deb10u4 2:4.13.13+dfsg-1~deb11u5 2:4.17.11+dfsg-0+deb12u1 2:4.17.12+dfsg-0+deb12u1 2:4.19.1+dfsg-4 2:4.19.2+dfsg-1 | |
Samba | <4.4.16 | |
Samba | >=4.5.0<4.5.14 | |
Samba | >=4.6.0<4.6.8 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
redhat gluster storage | =3.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12163 is rated as a medium severity vulnerability due to potential memory leak issues.
To fix CVE-2017-12163, upgrade Samba to a patched version that does not contain the vulnerability.
All versions of Samba prior to 4.4.17, including certain versions up to 4.17.12, are affected by CVE-2017-12163.
The risks of CVE-2017-12163 include the potential for unauthorized disclosure of server memory contents.
Disabling SMB1 can help mitigate the risks associated with CVE-2017-12163, but it is recommended to upgrade to a secure version of Samba.