First published: Wed Nov 28 2018(Updated: )
Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=4.7.0<4.7.12 | |
Samba | >=4.8.0<4.8.7 | |
Samba | >=4.9.0<4.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16853 has been classified as a moderate severity vulnerability affecting Samba AD domains.
To fix CVE-2018-16853, upgrade Samba to a version higher than 4.7.12, 4.8.7, or 4.9.3, depending on your installed version.
CVE-2018-16853 affects users operating a Samba Active Directory domain that is built with the MIT Kerberos configuration.
CVE-2018-16853 represents a denial-of-service vulnerability where a user can crash the Key Distribution Center (KDC).
The MIT Kerberos build of Samba is considered experimental and may not be stable as highlighted by CVE-2018-16853.