First published: Wed Sep 05 2018(Updated: )
All versions of Samba from 4.0.0 onwards are vulnerable to an information leak (compared with the established behaviour of Microsoft's Active Directory) when Samba is an Active Directory Domain Controller. Missing access control checks on the LDAP_SERVER_SHOW_DELETED_OID control in the DSDB database layer cause the LDAP server to disclose, to authenticated but not privileged users, the names and preserved attributes of deleted objects. (Microsoft AD simply does not return these objects on a search). No information that was hidden before the deletion is visible, but in Microsoft Active Directory the whole object is also not visible without administrative rights, whereas Samba allows read of limited set of attributes that are preserved after delete.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.0.0 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this information leak vulnerability is CVE-2018-14628.
The affected software for this vulnerability is Samba and Fedora.
The severity rating of CVE-2018-14628 is medium (4.3).
An authenticated but unprivileged attacker could exploit this vulnerability by discovering the names and preserved attributes of deleted objects in the LDAP store.
Yes, you can find references for this vulnerability at the following URLs: - [https://bugzilla.samba.org/show_bug.cgi?id=13595](https://bugzilla.samba.org/show_bug.cgi?id=13595) - [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2160799](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2160799) - [https://bugzilla.redhat.com/show_bug.cgi?id=1625445](https://bugzilla.redhat.com/show_bug.cgi?id=1625445)