First published: Tue Aug 14 2018(Updated: )
A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/samba | <2:4.7.6+dfsg~ubuntu-0ubuntu2.2 | 2:4.7.6+dfsg~ubuntu-0ubuntu2.2 |
ubuntu/samba | <4.7.9<4.8.4 | 4.7.9 4.8.4 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.0~rc1+really4.20.4+dfsg-1 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Samba | >=4.7.0<4.7.9 | |
Samba | >=4.8.0<4.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10918 is a null pointer dereference flaw in Samba that could allow an authenticated attacker to crash a Samba server in an Active Directory Domain Controller configuration.
Samba versions before 4.7.9 and 4.8.4 are vulnerable to CVE-2018-10918.
An authenticated attacker can exploit CVE-2018-10918 by using the null pointer dereference flaw in Samba to crash a server in an Active Directory Domain Controller configuration.
Yes, the fix for CVE-2018-10918 is included in Samba versions 4.7.9 and 4.8.4.
You can find more information about CVE-2018-10918 on the following websites: [SecurityFocus](http://www.securityfocus.com/bid/105083), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918), and [Gentoo Security](https://security.gentoo.org/glsa/202003-52).