First published: Tue Nov 27 2018(Updated: )
Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/samba | <2:4.7.6+dfsg~ubuntu-0ubuntu2.5 | 2:4.7.6+dfsg~ubuntu-0ubuntu2.5 |
ubuntu/samba | <2:4.8.4+dfsg-2ubuntu2.1 | 2:4.8.4+dfsg-2ubuntu2.1 |
ubuntu/samba | <2:4.3.11+dfsg-0ubuntu0.14.04.19 | 2:4.3.11+dfsg-0ubuntu0.14.04.19 |
ubuntu/samba | <4.7.12<4.8.7<4.9.3 | 4.7.12 4.8.7 4.9.3 |
ubuntu/samba | <2:4.3.11+dfsg-0ubuntu0.16.04.18 | 2:4.3.11+dfsg-0ubuntu0.16.04.18 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.0~rc1+really4.20.4+dfsg-1 | |
Samba | >=4.3.0<4.7.12 | |
Samba | >=4.8.0<4.8.7 | |
Samba | >=4.9.0<4.9.3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.