First published: Wed Nov 28 2018(Updated: )
Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=4.9.0<4.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16857 is considered a critical vulnerability due to its potential to allow an attacker to bypass bad password checks.
To fix CVE-2018-16857, you should upgrade your Samba installation to version 4.9.3 or later.
CVE-2018-16857 affects Samba versions from 4.9.0 up to but not including 4.9.3.
In an AD DC configuration, CVE-2018-16857 can lead to an increased risk of brute force attacks due to a failure to monitor bad password attempts.
While upgrading is the recommended solution, implementing stricter password policies may help mitigate some risks associated with CVE-2018-16857.