First published: Fri Nov 10 2017(Updated: )
As per upstream advisory: All versions of Samba from 4.0.0 onwards are vulnerable to a use after free vulnerability, where a malicious SMB1 request can be used to control the contents of heap memory via a deallocated heap pointer. It is possible this may be used to compromise the SMB server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/samba | 2:4.9.5+dfsg-5+deb10u3 2:4.9.5+dfsg-5+deb10u4 2:4.13.13+dfsg-1~deb11u5 2:4.17.11+dfsg-0+deb12u1 2:4.17.12+dfsg-0+deb12u1 2:4.19.1+dfsg-4 2:4.19.2+dfsg-1 | |
Samba | >=4.0.0<4.5.0 | |
Samba | >=4.5.0<4.5.15 | |
Samba | >=4.6.0<4.6.11 | |
Samba | >=4.7.0<4.7.3 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.04 | |
Ubuntu | =17.10 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14746 is considered a critical vulnerability due to its potential to allow an attacker to control heap memory through malicious SMB1 requests.
To fix CVE-2017-14746, upgrade to a patched version of Samba that is above 4.5.15 or apply relevant updates provided by your operating system vendor.
All versions of Samba from 4.0.0 onwards, up to 4.5.15, are vulnerable to CVE-2017-14746.
CVE-2017-14746 affects Samba installations on various platforms including Debian, Ubuntu, and Red Hat Linux.
Yes, CVE-2017-14746 can potentially be exploited remotely through malicious SMB1 requests targeting the Samba server.