First published: Wed Nov 28 2018(Updated: )
Samba from version 4.9.0 and before version 4.9.3 is vulnerable to a NULL pointer de-reference. During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate. There is no further vulnerability associated with this issue, merely a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=4.9.0<4.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16852 has a medium severity rating due to the possibility of a NULL pointer dereference leading to a denial of service.
To fix CVE-2018-16852, you should upgrade Samba to version 4.9.3 or later.
CVE-2018-16852 affects Samba versions 4.9.0 to 4.9.2.
Yes, CVE-2018-16852 can be exploited remotely via vulnerabilities in the DNS management DCE/RPC server.
The impact of CVE-2018-16852 includes the potential for denial of service to systems running affected Samba versions.