First published: Tue Nov 27 2018(Updated: )
Samba from version 4.0.0 and before versions 4.7.12, 4.8.7, 4.9.3 is vulnerable to a denial of service. During the processing of an LDAP search before Samba's AD DC returns the LDAP entries to the client, the entries are cached in a single memory object with a maximum size of 256MB. When this size is reached, the Samba process providing the LDAP service will follow the NULL pointer, terminating the process. There is no further vulnerability associated with this issue, merely a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/samba | <2:4.7.6+dfsg~ubuntu-0ubuntu2.5 | 2:4.7.6+dfsg~ubuntu-0ubuntu2.5 |
ubuntu/samba | <2:4.8.4+dfsg-2ubuntu2.1 | 2:4.8.4+dfsg-2ubuntu2.1 |
ubuntu/samba | <2:4.3.11+dfsg-0ubuntu0.14.04.19 | 2:4.3.11+dfsg-0ubuntu0.14.04.19 |
ubuntu/samba | <4.7.12<4.8.7<4.9.3 | 4.7.12 4.8.7 4.9.3 |
ubuntu/samba | <2:4.3.11+dfsg-0ubuntu0.16.04.18 | 2:4.3.11+dfsg-0ubuntu0.16.04.18 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.0~rc1+really4.20.4+dfsg-1 | |
Samba | >=4.0.0<4.7.12 | |
Samba | >=4.8.0<4.8.7 | |
Samba | >=4.9.0<4.9.3 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16851 is classified as a denial of service vulnerability affecting Samba.
To fix CVE-2018-16851, upgrade Samba to version 4.7.12, 4.8.7, or 4.9.3 or later.
Samba versions from 4.0.0 up to, but not including, 4.7.12, 4.8.7, and 4.9.3 are affected by CVE-2018-16851.
Yes, certain versions of Ubuntu with Samba versions prior to 4.7.12, 4.8.7, and 4.9.3 are impacted by CVE-2018-16851.
You can identify vulnerability to CVE-2018-16851 by checking your Samba version against the affected versions listed in the CVE description.